Strategy: Page 20
-
Surging cyberthreats, data concerns remain top dispute risks for organizations
A survey from Baker McKenzie shows a heightened risk of legal challenges amid a rise in sophisticated cyberattacks, along with concerns about the regulatory response.
By David Jones • Jan. 12, 2023 -
T-Mobile CSO: One wrong decision can wreak havoc
Adversaries attacked a T-Mobile honeypot 65 million times a day, Timothy Youngblood recalls.
By Matt Kapko • Jan. 11, 2023 -
Explore the Trendline➔
.shock via Getty ImagesTrendlineRisk Management
An esclation of cyber risks facing businesses and government has made cyber resilience a major priority.
By Cybersecurity Dive staff -
Beazley launches historic $45M cyber catastrophe bond
The announcement marks the first time an insurance-linked securities instrument has been created to cover catastrophic cyber risk.
By David Jones • Jan. 10, 2023 -
Tech priorities out of sync with security needs, CISA director says
As long as priorities and incentives are misaligned, security and safety needs will remain unmet. “We can’t just let technology off the hook,” Jen Easterly said.
By Matt Kapko • Jan. 9, 2023 -
6 security experts on what cyberthreats they expect in 2023
Organizations will keep a close eye on geopolitical tension and supply chain attacks. But at the core, the biggest threats are built on mistakes.
By Naomi Eide , Matt Kapko , David Jones • Jan. 6, 2023 -
Cybersecurity trends in 2023 that will directly impact everyday life
The scale of cyberthreats are growing, spilling into the mainstream. In 2023, expect the spotlight to add pressure to businesses that have underinvested in security.
By Sue Poremba • Jan. 3, 2023 -
Remote, third-party workers raise security risks for enterprises: report
A study on behalf of Talon shows third-party contractors are often engaged in risky behavior, using unmanaged devices or high-risk desktop technologies.
By David Jones • Dec. 21, 2022 -
Apple CIO steps down from Rackspace board citing new job duties
Rackspace announced additional management changes while it recovers from a ransomware attack on its Hosted Exchange business.
By David Jones • Dec. 19, 2022 -
Opinion
How to upgrade cybersecurity awareness training
Phishing attacks are not always as obvious as a direct message from someone pretending to be Elon Musk asking you to buy cryptocurrency. To better equip employees, cyber training needs an upgrade.
By James Karimi • Dec. 12, 2022 -
Google stresses unmet need for software supply chain security
The open source software ecosystem remains vulnerable, and fragmented efforts could stifle progress, according to Google.
By Matt Kapko • Dec. 8, 2022 -
Apple expands iCloud encryption, boosts MFA with security keys
Additional security features could prevent phishing scams and lower exposure for companies that let workers use personal devices for work.
By Matt Kapko • Dec. 8, 2022 -
Microsoft taps security demand to drive M365 amid fragmented market
A top company executive said a key driver is to bundle its cybersecurity capabilities with office productivity applications, as customers look to consolidate vendors.
By David Jones • Dec. 7, 2022 -
What does it take to be good at cybersecurity?
Few large enterprises meet Deloitte’s standards for high cyber maturity. The 21% that do recognize benefits not typically associated with security.
By Matt Kapko • Dec. 7, 2022 -
7 of this year’s biggest cybersecurity stories
From vendor evolution to the long-term effects of high-profile attacks, the cybersecurity industry is rapidly evolving. Take a look at our top stories to understand just how much has changed.
By Naomi Eide • Dec. 5, 2022 -
AWS builds a lake for multivendor security data sharing
Security data is scattered and often stored in fragments from multiple sources. AWS wants to centralize that in a single data lake.
By Matt Kapko • Dec. 2, 2022 -
CrowdStrike CEO: SMB deals delayed as enterprises hold firm on cyber spend
Fears of a recession are impacting the cybersecurity investments of smaller organizations and enterprises in different ways, George Kurtz said.
By Matt Kapko • Dec. 1, 2022 -
Walmart security, operating at a vast scale, turns to automation
Security operations centers, part of Walmart Global Tech, process 6 trillion data points each year, a feat unattainable through manual methods.
By Naomi Eide • Nov. 30, 2022 -
AWS CEO stresses the core elements of cloud security
Adam Selipsky described security as a prerequisite for organizations to trust cloud infrastructure. And for that, he claimed, AWS is the best in the game.
By Matt Kapko • Nov. 30, 2022 -
Deep Dive
Where is AWS in the cybersecurity conversation?
The cloud leader doesn’t emphasize security and share information at the same level as its competitors. Experts say that's by design.
By Matt Kapko • Nov. 29, 2022 -
As companies tighten tech spend, demand for cybersecurity services grows
Managed service providers can help fill talent needs and tame costs, but that strategy may require additional risk mitigation.
By Suman Bhattacharyya • Nov. 28, 2022 -
Defense Department launches zero trust, phasing out perimeter defense strategy
Private sector partners say the rollout will raise the security bar to better protect the entire defense industry ecosystem.
By David Jones • Nov. 23, 2022 -
Growing Mastodon security community grapples with CISA impersonators
An infosec.exchange account impersonating CISA Director Jen Easterly was suspended by the Mastodon instance administrator Monday, as the security community searches for a Twitter alternative.
By Matt Kapko • Nov. 23, 2022 -
Security awareness training needs a revamp
Too often security training is seen as a negative experience and a time to reprimand those who make security gaffes. But old strategies aren’t working. It’s time for a redo.
By Sue Poremba • Nov. 22, 2022 -
Tech sector execs see potential recession as a business opportunity
Technology company leaders are preparing for economic downturn by investing selectively in the workforce and new technologies, according to EY survey.
By Matt Ashare • Nov. 21, 2022 -
Where will the security community turn, if not Twitter?
A consistent stream of credibility hits could cause lasting damage for cybersecurity and those who flock there.
By Matt Kapko • Nov. 21, 2022