Strategy: Page 23


  • Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    Organizational changes required to mitigate security risks

    Executives are implementing new strategies to lower software supply chain risk, but evaluating internal operations could prove more effective.

    By Lindsey Wilkinson • June 7, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineāž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Oil and gas industry pledges cyber cooperation at World Economic Forum

    Energy companies and industrial cybersecurity firms are working collaboratively to protect critical infrastructure in an evolving threat environment.

    By May 26, 2022
  • Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Feds remain in the dark as ransomware disclosure lags

    The government's lack of ransomware data makes it more difficult to prevent, mitigate and recover from attacks, said Sen. Gary Peters, D-MI.

    By May 25, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • Lucia MilicăĀ Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISOs say they're at less risk of a substantial cyberattack

    A modest confidence boost and more deliberate security strategies follow two years of pandemic-induced chaos, a Proofpoint-sponsored survey found.

    By May 17, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Microsoft, Apple and Google double down on FIDO passwordless standard

    The move is designed to boost digital security by allowing users to quickly authenticate across multiple devices and platforms. 

    By May 5, 2022
  • A picture of the street sign stating "Wall Street." American flags drape over a nearby building
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip

    M&A sets record pace as ransomware, nation-state threats fuel security demand

    Enterprise customers seek consolidated, end-to-end platforms to anticipate, detect and eliminate threats. 

    By April 29, 2022
  • A stock image of a calculator alongside financial numbers
    Image attribution tooltip
    atiatiati via Getty Images
    Image attribution tooltip

    What cyber insurance companies want from clients

    Insurers evaluate how a company leverages technology and what internal standards are in place to manage risk.

    By Sue Poremba • April 28, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Ransomware attacks, payouts soared worldwide in 2021: report

    More organizations are paying ransoms as attacks grow in sophistication.

    By April 27, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies.

    By Brian Eastwood • April 25, 2022
  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Behind the push to finally eliminate passwords

    The FIDO Alliance is pushing for smartphones to become the authentication standard as the tech industry presses for new methods. 

    By Lance Whitney • April 20, 2022
  • Image attribution tooltip
    marchmeena29 via Getty Images
    Image attribution tooltip
    Sponsored by Hyperproof

    How to advocate for your security, compliance and risk management program

    Feel like your compliance and security team could be better supported? Follow these five best practices to ensure your team gets the resources they need from leadership.

    April 18, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    2 years later: What's next in security for the pandemic-era workforce

    Organizations can expect the return-to-work model to stress a corporate infrastructure that has languished in recent years. 

    By Sue Poremba • April 13, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Datto, SailPoint acquired for more than $6B each amid growing cyber consolidation

    Buyers Kaseya and Thoma Bravo join the feeding frenzy a month after Google’s $5.4 billion deal to buy Mandiant.

    By April 11, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip
    Opinion

    Midsize enterprises: Strengthen security for today's threat landscape

    Midsize enterprises must protect against the same security threats as larger organizations, but with smaller budgets and fewer IT resources.

    By Paul Furtado • April 4, 2022
  • The Kronos outage disrupted one employer's payroll for more than a month. Here's how it moved forward.

    UMass Memorial Health had to quickly improvise to run payroll for more than 16,000 employees without hours-worked data, CFO Sergio Melgar said. 

    By Ryan Golden • March 24, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft rolls out security red carpet for competitors' cloud customers

    With a cloud-agnostic security tool in hand, Microsoft is vying to support customers' multicloud strategies. 

    By Barbara DeLollis • March 23, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Company signage outside Google's offices in Germany
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Dinner is served: Cyber M&A feeding frenzy shows hunger for trust

    Google's $5.4 billion bid for Mandiant was just one of 200-plus cybersecurity deals last year.

    By March 17, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CrowdStrike shares surge on strong Q4 earnings and robust annual forecast

    The cybersecurity firm reported a blockbuster Q4 a day after rival Mandiant was acquired by Google.  

    By March 10, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google swoops in to buy Mandiant for $5.4B after weeks of market speculation

    The deal follows reported negotiations between Microsoft and the incident response specialist, which sold off its FireEye products business last year.

    By Updated March 8, 2022
  • A person works from home
    Image attribution tooltip
    FreshSplash via Getty Images
    Image attribution tooltip

    How HR can prepare for a cyberattack

    Incurring some risk is the nature of business, but backup plans and cybersecurity training are key.

    By Caroline Colvin • March 4, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Security hampers enterprise cloud adoption: report

    Multicloud adoption adds complexity as IT security teams struggle with alert fatigue.

    By Feb. 22, 2022