Strategy: Page 29


  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Security spending to rise, buoyed by cloud: Gartner

    Cloud security was the "smallest, but fastest growing" market, according to the research firm. 

    By Samantha Schwartz • May 18, 2021
  • President Joe Biden participates in a conference phone call with governors affected by a snowstorm in the Midwest and southwest Tuesday, Feb. 16, 2021, in the Oval Office of the White House.
    Image attribution tooltip
    Retrieved from The White House.
    Image attribution tooltip
    White House cyber strategy takes shape

    White House cybersecurity order lands with a plea for private sector help

    Federal action alone is not enough, the White House said, though higher government standards could improve private sector security. 

    By Samantha Schwartz • May 13, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Collaboration breakdowns hurt security, transformation

    Companies that succeeded at pivoting to remote work, and managing the associated IT and cybersecurity challenges, were those that enabled cross-functional teams.

    By Roberto Torres • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
    Image attribution tooltip

    DHS cybersecurity sprints focus on ransomware, hiring

    The agency intends to undergo "the most significant hiring initiative" in its history to defend against cyberattacks, said Secretary Alejandro Mayorkas.

    By Samantha Schwartz • May 6, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Cyberthreats dog the US supply chain, complicated by global competition

    As companies acquire components and services, they need mechanisms to ensure backdoors are not lurking in their systems, experts at the Hack the Capitol 2021 conference said.

    By May 5, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    Relationships between DevOps, security warm slowly

    Some hurdles stem from miscommunication, or balancing quick product releases with undesired security gaps, research from GitLab shows. 

    By Samantha Schwartz • May 5, 2021
  • Hands on a keyboard
    Image attribution tooltip
    skynesher/E+ via Getty Images
    Image attribution tooltip

    When bad actors target OT, risk is recalculated

    Digital transformation is shrinking the gap between IT and OT, and organizations are called to factor diverse systems into risk calculations.

    By Samantha Schwartz • May 4, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    XDR to succeed legacy technologies as emerging threats pressure security

    Older SIEM and SOAR technologies are losing ground in a more sophisticated threat landscape, Forrester research shows.

    By May 3, 2021
  • CISOs call for holistic enterprise approach to third-party security risk

    Companies need to consider operational resilience, and take a more focused approach in their evaluation processes.

    By April 21, 2021
  • Drug production area, Merck (KGaA) Darmstadt, Germany
    Image attribution tooltip
    Permission granted by Merck KGaA
    Image attribution tooltip

    Pfizer segmented IT/OT after a board-level security directive

    The pharma company's IT and engineering organizations formed a combined security program in 2018, responsible for technology analysis and inventory.

    By Samantha Schwartz • April 21, 2021
  • A woman working from home
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    US companies plot return to office, raising questions on hybrid security

    Remote workers are migrating to the corporate workspace, opening up a set of security challenges for CISOs. 

    By April 19, 2021
  • Image attribution tooltip
    Depositphotos
    Image attribution tooltip

    How IT can support security in the event of a cyberattack

    CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled. 

    By Jen A. Miller • April 13, 2021
  • How to support overworked, understaffed security operations

    Strapped for resources, companies can either have their security practitioners wear too many hats, or outsource the responsibilities. 

    By Samantha Schwartz • April 12, 2021
  • A still of COVID-19 vaccine vials from Johnson & Johnson going through production
    Image attribution tooltip
    Permission granted by Johnson & Johnson
    Image attribution tooltip
    Deep Dive

    4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain

    Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.

    By Deborah Abrams Kaplan • April 7, 2021
  • Image attribution tooltip
    Daphne Howland/Cybersecurity Dive
    Image attribution tooltip

    Why SMBs miss out on the white-glove cyber insurance advantage

    Insurance companies spend less time with SMBs evaluating individual risk profiles, weakening a piece of the global cyber economy.

    By Samantha Schwartz • April 5, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Half of companies lack security to support cloud-based IAM: report

    Almost all (98%) of IT executives report challenges with IAM sourced from the cloud, including lack of visibility and increased complexity.

    By April 1, 2021
  • Enterprises lag on firmware security spending in face of rising threat

    IT security officials are often more worried about the difficulty of detecting malware threats, in part because firmware attacks are hard to catch, a Microsoft-commissioned report found. 

    By April 1, 2021
  • How tools impact cyber insurance premiums

    From the day insurers write a policy through its term expiration, there is too much volatility for insurance providers to adequately capture risk.

    By Samantha Schwartz • March 31, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Companies use cloud to make network security easier

    With the cloud taking over hardware and infrastructure security responsibilities, customers are free to handle application and software security.

    By Samantha Schwartz • March 29, 2021
  • Operational threat intelligence leans on facts, less anecdotal evidence

    Digesting threat intelligence looks different in IT environments than OT.

    By Samantha Schwartz • March 25, 2021
  • As cyber insurers quantify risk, security spending provides little info

    Quantifying risk appetite, an assessment insurance premiums are based on, is an imperfect science for providers and customers.

    By Samantha Schwartz • March 24, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Spending on IAM, zero trust to rise as companies extend remote work

    The shift to remote work placed more pressure on IT and security departments to secure corporate data without interrupting productivity.

    By March 23, 2021
  • Opinion

    Prioritizing risk in M&A due diligence in the COVID-19 era, and beyond

    Imagine acquiring a company with an infected network, and then connecting your company to that flawed network. That can introduce serious issues into a previously protected company. 

    By Ray Rothrock • March 22, 2021