Strategy: Page 24


  • A picture of the Microsoft campus in Redmond, Washington.
    Image attribution tooltip
    Stephen Brashear/Stringer via Getty Images
    Image attribution tooltip

    Microsoft rollback on macro blocking in Office sows confusion

    The company said it remains "fully committed" to disabling macros by default, and the temporary measure will make the product more user friendly.

    By July 11, 2022
  • Group of young business people discussing with colleagues on video conference on meeting.
    Image attribution tooltip
    vgajic via Getty Images
    Image attribution tooltip
    Opinion

    How CISOs can prepare for new and unpredictable cyberthreats

    CISOs often ask, “How do I avoid being hit by the next major cyberattack?” The problem is, that’s the wrong question.  

    By Jeremy D’Hoinne • July 11, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Two people look at five computer screens showing code and digital maps in an office. A third person talks on the phone while looking at a paper.
    Image attribution tooltip
    shironosov via Getty Images
    Image attribution tooltip

    Mid-sized companies grapple with response to cyber crises

    Limited resources, staffing and executive awareness can hamper attack response capabilities.

    By July 8, 2022
  • A person works next to a 5G logo.
    Image attribution tooltip
    David Ramos/Getty Images via Getty Images
    Image attribution tooltip

    What to watch with 5G network security

    For wireless network carriers, 5G is a model of what’s next. But it also introduces features and services that dramatically expand the threat surface.

    By July 8, 2022
  • A diverse group of executives talking in meeting room.
    Image attribution tooltip
    FangXiaNuo via Getty Images
    Image attribution tooltip

    CISO priorities for the second half of 2022

    Security executives from Zoom, NS1 and Oomnitza shared their security priorities for the rest of 2022, with a special emphasis on mastering the basics. 

    By Sue Poremba • July 5, 2022
  • Money moving through cyberspace.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Pricing pressures moderate as cyber insurance market begins to level out

    A surge in new buyers has begun to offset years of rising claims and higher premiums, according to data from global insurance firm Marsh.

    By Naomi Eide • July 1, 2022
  • Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Google enhances password manager to boost security across platforms

    Updates will allow users to manage passwords across platforms, including Chrome, Android and iOS. 

    By June 30, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    Organizations lag on confidence and policies to manage open source security

    It's taking longer for companies to find open source vulnerabilities, and shaky policies mean only the most critical vulnerabilities are attended to. 

    By June 24, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Analysts nudge businesses to decentralize cybersecurity leadership

    The push is to enable employees to make informed security decisions while meeting enterprise needs with spread out security leadership. 

    By Lindsey Wilkinson • June 22, 2022
  • Software building
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip
    Q&A

    What enterprise leaders can divine from software bills of materials

    Cyber defense tool: Software bills of materials (SBOMs) can expose elements of risks in applications.

    By Jen A. Miller • June 17, 2022
  • Image depicts the implementation of cybersecurity with a lock displayed over a screen.
    Image attribution tooltip
    anyaberkut via Getty Images
    Image attribution tooltip

    Ransomware groups shift tactics and objectives

    Malware can play a major or nonexistent role in ransomware attacks. Threat actors are often only in it for the money.

    By June 15, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    How and why ransomware responses go haywire

    A lack of fortitude and preparation on the communications front often puts enterprises at risk for greater harm.

    By June 13, 2022
  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images
    Image attribution tooltip

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    Organizational changes required to mitigate security risks

    Executives are implementing new strategies to lower software supply chain risk, but evaluating internal operations could prove more effective.

    By Lindsey Wilkinson • June 7, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Oil and gas industry pledges cyber cooperation at World Economic Forum

    Energy companies and industrial cybersecurity firms are working collaboratively to protect critical infrastructure in an evolving threat environment.

    By May 26, 2022
  • Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Feds remain in the dark as ransomware disclosure lags

    The government's lack of ransomware data makes it more difficult to prevent, mitigate and recover from attacks, said Sen. Gary Peters, D-MI.

    By May 25, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISOs say they're at less risk of a substantial cyberattack

    A modest confidence boost and more deliberate security strategies follow two years of pandemic-induced chaos, a Proofpoint-sponsored survey found.

    By May 17, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Microsoft, Apple and Google double down on FIDO passwordless standard

    The move is designed to boost digital security by allowing users to quickly authenticate across multiple devices and platforms. 

    By May 5, 2022
  • A picture of the street sign stating "Wall Street." American flags drape over a nearby building
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip

    M&A sets record pace as ransomware, nation-state threats fuel security demand

    Enterprise customers seek consolidated, end-to-end platforms to anticipate, detect and eliminate threats. 

    By April 29, 2022
  • A stock image of a calculator alongside financial numbers
    Image attribution tooltip
    atiatiati via Getty Images
    Image attribution tooltip

    What cyber insurance companies want from clients

    Insurers evaluate how a company leverages technology and what internal standards are in place to manage risk.

    By Sue Poremba • April 28, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Ransomware attacks, payouts soared worldwide in 2021: report

    More organizations are paying ransoms as attacks grow in sophistication.

    By April 27, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies.

    By Brian Eastwood • April 25, 2022