Strategy: Page 21


  • Financial graph, software, cash flow
    Image attribution tooltip
    Ca-ssis via Getty Images
    Image attribution tooltip

    Palo Alto Networks reports strong fiscal Q1 as security needs outpace economic fears

    The security firm also agreed to buy Cider Security, boosting its software supply chain security business.

    By Nov. 21, 2022
  • Cash dollars lying on the ground
    Image attribution tooltip
    Rrraum via Getty Images
    Image attribution tooltip

    SMB cyber budgets under pressure amid slowing economy

    The potential budget cuts during a period marked by market volatility could increase organizational risk.

    By Nov. 17, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Critical infrastructure providers ask CISA to place guardrails on reporting requirements

    Top companies and industry groups fear incident reporting mandates would overwhelm CISA with noise. 

    By Nov. 16, 2022
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    sdecoret via Getty Images
    Image attribution tooltip

    Confidential computing critical for cloud security, Google and Intel say

    Confidential computing aims to isolate and encrypt data in use. The technology is young, but it could deliver significant gains for cloud security.

    By Nov. 15, 2022
  • A row of blue lockers in an empty school hallway.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    K-12 schools lack resources, funding to combat ransomware threat

    One-fifth of schools spend less than 1% of their IT budgets on security, a MS-ISAC report shows.

    By Nov. 14, 2022
  • Industrial technology concept showing a shipping industry and communication network.
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    5 security musts for industrial control systems

    OT involves a collection of dedicated systems and physics, and that creates distinct security requirements, said Robert M. Lee, CEO and co-founder at Dragos.

    By Nov. 10, 2022
  • A stack of snack food packages from Mondelez International, including Wheat Thins, Oreos, Ritz and Sour Patch kids.
    Image attribution tooltip
    Courtesy of Mondelē​​z International
    Image attribution tooltip

    Mondelē​​z settlement in NotPetya case renews concerns about cyber insurance coverage

    The legal dispute between the snack giant and insurer Zurich American, which lasted four years, raises further questions about how insurers cover acts of cyber war.

    By Nov. 8, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Face it, password policies and managers are not protecting users

    Passwords haven’t worked as a solid security strategy in a long time. The policies are there, so why are passwords security’s weak spot?

    By Sue Poremba • Nov. 7, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip
    Opinion

    How to implement an effective system to address third-party risk

    Current processes for assessing and managing third-party cybersecurity risks are cumbersome and ineffective. CISOs must adopt new principles to address business exposure.

    By Sam Olyaei • Nov. 7, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    CISA demystifies phishing-resistant MFA

    The “gold standard” safeguard isn’t a one-size-fits-all or all-or-nothing endeavor. For most organizations, a phased approach works best.

    By Nov. 4, 2022
  • View from above of vast vats of brown liquid.
    Image attribution tooltip
    Courtesy of Brown and Caldwell
    Image attribution tooltip

    NIST seeks water industry feedback on boosting cyber resilience

    The Biden administration is turning its security attention to the water and wastewater treatment industry, which has become vulnerable to cyberattacks as facilities grow more digital.

    By Nov. 4, 2022
  • A depiction of computer hardware.
    Image attribution tooltip
    solarseven via Getty Images
    Image attribution tooltip

    Industrial providers ramp up cyber risk posture as OT threats evolve

    The majority of industrial organizations have increased OT security budgets and conducted security audits but aging technology and staffing woes persist, a new report found. 

    By Oct. 31, 2022
  • Engineer's toolbox
    Image attribution tooltip
    Matt Cardy/Getty Images via Getty Images
    Image attribution tooltip

    ‘Point solutions just need to die’: The end of the one-trick security tool

    The deconstruction of security products has foisted many avoidable challenges upon organizations and the industry at large.

    By Oct. 31, 2022
  • A Microsoft logo is seen during the 2015 Microsoft Build Conference on April 29, 2015 at Moscone Center in San Francisco, California.
    Image attribution tooltip
    Stephen Lam via Getty Images
    Image attribution tooltip

    Microsoft security business surges as cloud segment hit by slumping economy

    Higher energy costs and the macro economic slowdown is impacting the company’s cloud segment, while it continues to grow its enterprise security business.

    By Oct. 26, 2022
  • Training and upskilling in data science and analytics
    Image attribution tooltip
    shironosov via Getty Images
    Image attribution tooltip

    Help wanted for 3.4M jobs: Cyber workforce shortage is an acute, worldwide problem

    Research from (ICS)2 shows an ongoing skills gap in the information security space is under greater pressure than before.

    By Oct. 24, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    4 security predictions from Google’s cyber leaders

    The hopeful forecasts aren’t exclusive to Google’s cybersecurity experts. Many believe the industry is poised to deliver on its mission with greater efficiency and effect.

    By Oct. 21, 2022
  • Customers carry bags as they leave a Target store in Albany, California
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    4 ways Target dynamically tracks the most alarming threats

    The retailer’s threat analysts identify stakeholders and map adversaries’ intents and capabilities. The company notes it’s also important to not treat all threats equally.

    By Oct. 20, 2022
  • A closeup up a car dashboard with a a driver's hand. A phone is on a mount to the right of the steering wheel.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Uber ex-CSO verdict raises thorny issues of cyber governance and transparency

    The former chief security officer of the ride-sharing firm is seen by many as a scapegoat for an unsupervised and unaccountable corporate culture.

    By Oct. 19, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Cybersecurity spending on pace to surpass $260B by 2026

    Gartner pinned annual double-digit growth on three transitionary megatrends: remote work, zero trust network access, and the cloud.

    By Oct. 18, 2022
  • Kevin Mandia, CEO, Mandiant, keynote during the Mandiant Cyber Defense Summit 2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    Mandiant CEO pledges to automate threat intel under Google

    Google’s chops in artificial intelligence, cloud computing and analytics play a central role in Mandiant’s emboldened vision.

    By Oct. 17, 2022
  • Lights reflect off of server cases.
    Image attribution tooltip
    Kwarkot/iStock via Getty Images
    Image attribution tooltip

    As cybersecurity threats rage, colleges invest in risk prevention and pay higher insurance premiums

    Cyber insurance policy renewal price increases are typically between 40% and 60%, with some increases hitting the triple digits, S&P said.

    By Rick Seltzer • Oct. 14, 2022
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    4 tips to protect IT employees from phishing attacks

    No one is perfect, and that includes your IT professionals. Here's what security experts say could help mitigate human error.

    By Lindsey Wilkinson • Oct. 14, 2022
  • Coin Stacks Sitting on A Blue Financial Graph Background
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Signs of stability emerge in turbulent cyber insurance market

    Rates continue to soar, but Marsh research shows the pace of increases is slowing. 

    By Naomi Eide • Oct. 13, 2022
  • Microsoft logo on buidling
    Image attribution tooltip
    Drew Angerer / Staff via Getty Images
    Image attribution tooltip

    Microsoft’s CISO on why cloud matters for security response

    Cloud can give companies insight into current and future threats as the landscape grows more complex, said Bret Arsenault.

    By Roberto Torres • Oct. 12, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Mandiant propels Google Cloud’s security prospects

    With Mandiant officially under his wing, Google Cloud CISO Phil Venables expects the incident responders to help Google become a proactive force.

    By Oct. 11, 2022