Strategy: Page 22


  • A creative image depicting cybersecurity that includes a lock.
    Image attribution tooltip
    greenbutterfly/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    What is phishing-resistant multifactor authentication? It’s complicated.

    Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.

    By Oct. 10, 2022
  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    studio-fi via Getty Images
    Image attribution tooltip

    CISOs, corporate boards in wide disagreement on cyber resilience

    A study backed by researchers from MIT shows corporate boards are more focused on cyber risk, but are out of alignment with CISOs on key issues. 

    By Oct. 10, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Sean M. Haffey via Getty Images
    Image attribution tooltip

    Cybersecurity needs a statewide approach, report finds

    Research from Deloitte and state CIOs shows cities often hesitate to work with states on cybersecurity to protect their autonomy, but local government cyber grants could change that. 

    By Michael Brady • Oct. 10, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Multifactor authentication is not all it’s cracked up to be

    Text message and email-based authentication aren’t just the weakest variants of MFA. Cybersecurity professionals say they are broken.

    By Oct. 5, 2022
  • A businessperson holding up a cybersecurity symbol
    Image attribution tooltip
    greenbutterfly via Getty Images
    Image attribution tooltip
    Opinion

    Why user experience is essential to identity protection

    Organizations must strike a delicate balance between maximizing end-user protection and minimizing the security-related obstacles.

    By Kapil Raina • Oct. 5, 2022
  • Padlock on credit cards and us dollars.
    Image attribution tooltip
    baona via Getty Images
    Image attribution tooltip

    Security to take an outsized role in IT spending in 2023

    “If you look across all of these categories, security is a line item in all of them,” Spiceworks Ziff Davis’ Peter Tsai said.

    By Matt Ashare • Oct. 4, 2022
  • Man standing with hands on table at table at a meeting with other people in professional setting.
    Image attribution tooltip
    Ridofranz via Getty Images
    Image attribution tooltip

    C-suite, boards are prioritizing cybersecurity, but still expect increased threats

    Senior executives around the world are taking risk management more seriously, PwC research found, but many are still concerned about business resilience.

    By Sept. 30, 2022
  • African-American IT developer typing on keyboard with black and orange programming code on computer screen and laptop in contemporary office interior, copy space
    Image attribution tooltip
    SeventyFour via Getty Images
    Image attribution tooltip

    Google Cloud research links CI/CD to security prowess

    The benefits of automated processes for application development extend beyond organizational performance and have a positive impact on security.

    By Sept. 29, 2022
  • Cloud computing technology internet on binary code with abstract background. Cloud Service, Cloud Storage Concept. 3D render.
    Image attribution tooltip
    Peach_iStock via Getty Images
    Image attribution tooltip

    Most organizations had a cloud-related security incident in the past year

    Security leaders consider the risk of cloud-based incidents higher than on-premises incidents, yet they expect to move more applications to the cloud. 

    By Sept. 28, 2022
  • Close-up Portrait of Software Engineer Working on Computer, Line of Code Reflecting in Glasses.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cyber paradox: Security looms as obstacle and opportunity in cloud migration

    Data protection and compliance solutions are easing cloud adoption even as cyber concerns persist.

    By Matt Ashare • Sept. 27, 2022
  • Cell phone or mobile service tower in forested area of West Virginia providing broadband service
    Image attribution tooltip
    BackyardProduction via Getty Images
    Image attribution tooltip

    How common telecom cyber risks snowball in cloud, open source

    Public cloud plays a central role in the modernization of wireless networks. But more open source software, vendors and vulnerabilities could spell trouble.

    By Sept. 23, 2022
  • Concept with expert setting up automated software on laptop computer.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Organizations rapidly shift tactics to secure the software supply chain

    Synopsys’ 13th annual BSIMM study shows rapid increases in automation and use of SBOMs among software producers and other organizations.

    By Sept. 22, 2022
  • A young student walks between two lines of people holding pom-poms and high-fiving. A yellow school bus is in the background
    Image attribution tooltip
    Permission granted by Cincinnati Public Schools
    Image attribution tooltip

    The tools and strategies schools need for ransomware defense

    CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.

    By Sept. 22, 2022
  • Young Woman Writing Code on Desktop Computer in Stylish Loft Apartment in the Evening.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    ‘Shift-left’ software strategy challenged by security and compliance

    Developer burnout and supply chain concerns mount as companies push to begin software testing early in the development process.

    By Matt Ashare • Sept. 22, 2022
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    US government rejects ransom payment ban to spur disclosure

    Federal authorities strongly discourage organizations from paying ransoms, but Anne Neuberger of the National Security Council explains why it decided against a ban.

    By Sept. 19, 2022
  • Industrial equipment (pipes, manometer/pressure gauge, levers, faucets, indicators) in a natural gas compressor station.
    Image attribution tooltip
    Cat Eye Perspective via Getty Images
    Image attribution tooltip

    Industrial control systems face more cyber risks than IT, expert testifies

    Most ICS technology was designed more than 20 years ago and built without cyber resilience, Idaho National Laboratory's Vergle Gipson said. 

    By Sept. 16, 2022
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Microsoft cloud security exec challenges organizations to ditch outdated practices

    Modern systems and modes of attack demand a dynamic and realistic security strategy, Shawn Bice said. The problem can be managed, not solved.

    By Sept. 16, 2022
  • A stack of $20 U.S. bills lay on top of a scattering of more $20 bills.
    Image attribution tooltip
    Maksym Kapliuk via Getty Images
    Image attribution tooltip

    State education leaders prioritize cybersecurity, but lack funding

    In a survey by the State Educational Technology Directors Association, 57% of respondents said their state provides a low amount of funding for cybersecurity.

    By Anna Merod • Sept. 15, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Security vendor consolidation a priority for majority of organizations worldwide

    Gartner research shows a surge in organizations that want to reduce the complexity of their security stacks.

    By Sept. 14, 2022
  • Sen. Angus King was part of a panel with Suzanne Spaulding and Mike Montgomery at the Billington CyberSecurity Summit in Washington D.C.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    US is shoring up gaps in cyber policy, but critical goals remain unfulfilled

    Legislators say the Cyberspace Solarium Commission led to significant national security enhancements, but analysts are calling for urgent momentum on a federal law on data privacy and security.

    By Sept. 13, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google closes $5.4B Mandiant acquisition

    The Mandiant buy marks the second most expensive acquisition in Google’s history, underscoring the cloud provider’s commitment to become a standalone security brand.

    By Sept. 12, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA announces RFI for critical infrastructure cyber reporting mandate

    The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.

    By Sept. 9, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By Sept. 7, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Most organizations remain unprepared for ransomware attacks

    Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.

    By Sept. 6, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Okta CEO pushes for passwordless future in wake of phishing attacks

    Customers that rely on passwords and log-in pages are putting their organizations at greater risk of attack, Todd McKinnon told analysts.

    By Sept. 2, 2022