Strategy: Page 29
-
Sponsored by Avanan
The next generation of email security
Now, with a single approval of an API, every line of cloud business communication can be secured.
Feb. 16, 2021 -
Sponsored by Code42
The downside of the remote work shift: 85% increase in Insider Risk
The Code42 2021 Data Exposure Report reveals a perfect storm for Insider Risk.
Feb. 16, 2021 -
Trendline
Risk Management
Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues.
By Cybersecurity Dive staff -
Software supply chain hacks highlight an ugly truth: The build process is broken
Software makers are coming to terms with security gaps they knew existed as the fallout from the SolarWinds hack continues.
By Samantha Schwartz • Feb. 11, 2021 -
FireEye reports record revenue in first report since Red Team hack
The company's discovery of the SolarWinds attack has fueled additional customer demand, which should be reflected in deferred revenue during 2021.
By David Jones • Feb. 3, 2021 -
Opinion
Gartner: Steps to respond to a supply chain attack
Businesses require tools to detect the lateral movement from an initial compromise and an incident response plan.
By Peter Firstbrook • Feb. 1, 2021 -
Supply chain attacks renew focus on limiting privileged access to cloud data
Supply chain attacks and rapid shifts to cloud data storage have led companies to reduce access by third-party vendors and employees to sensitive data.
By David Jones • Jan. 29, 2021 -
GDPR regulators are sinking their teeth into violators. 2020's fines are proof.
The European regulation took about a year before major fines were introduced. Watchdogs are in a grey area of harnessing better privacy standards and having zero tolerance for negligent or intentional violations.
By Samantha Schwartz • Jan. 28, 2021 -
Biden campaign cyber chief named federal CISO
Cybersecurity veterans praised the appointment, highlighting Chris DeRusha's extensive government and private sector experience, useful for navigating SolarWinds fallout.
By David Jones • Jan. 27, 2021 -
Cyberthreat trends in the remote work landscape
With more workers logging in from home, companies face new cybersecurity challenges and opportunities.
By David Jones • Jan. 25, 2021 -
Cybersecurity market set to reach $60B in 2021: report
Unknown threats, like the ones emerging from the SolarWinds hack, are shaping the future of investments.
By Samantha Schwartz • Jan. 22, 2021 -
Technology's greatest supply chain challenge? Establishing trust
Geopolitics play a role in how the private sector purchases technology, influencing what on- and offshore vendors companies decide to trust.
By Samantha Schwartz • Jan. 21, 2021 -
Cyber defense panel sees more private sector coordination following SolarWinds
Defense and intelligence experts say federal agencies need to strengthen private sector support, intelligence sharing to prevent the next big nation-state attack.
By David Jones • Jan. 20, 2021 -
How one hospital is defending against ransomware
By the time the Ryuk ransomware alert was issued, Rush Memorial Hospital had at least two risk mitigation measures: improved backup as a service and a systems engineer with an evasion plan.
By Samantha Schwartz • Dec. 22, 2020 -
SolarWinds breach reminds companies to be proactive in managing trust, disclosure
Legal and forensics experts warn CISOs about supply chain monitoring and transparency amid fallout from historic attack.
By David Jones • Dec. 22, 2020 -
After years in the lab, IBM ready to take homomorphic encryption into the mainstream
Increased use of hybrid cloud and a successful pilot program help build the case for processing highly-encrypted data in transit.
By David Jones • Dec. 18, 2020 -
COVID-19 vaccine supply chain has cyberthreats hidden in plain sight
Outdated systems throughout vaccine distribution logistics carry unprecedented cyberthreats.
By Samantha Schwartz • Dec. 16, 2020 -
National defense bill is heavy on cyber. What it means for the private sector.
The recommendations are intended to remedy areas of distrust and construct a more resilient cyber infrastructure, regardless of sector.
By Samantha Schwartz • Dec. 7, 2020 -
Why some industries are more secure than others
Threats go beyond industry and target organizations depending on business size. Company size is a factor, but so is investment in cyber defense.
By Sue Poremba • Dec. 7, 2020 -
NERC expands IT-focused cybersecurity program as hackers target grid operations tech
Previously focused on utility operations IT, the Cybersecurity Risk Information Sharing Program will now include two pilots scanning for threats to operational technologies.
By Robert Walton • Dec. 4, 2020 -
What security experts expect from Biden's cyber strategy
The private sector is playing a more active role in national security. Now, security professionals are hungry for even more cross-sector collaboration.
By Samantha Schwartz • Dec. 3, 2020 -
Proactive technology upgrades prevent security nightmares, report finds
Successful enterprises stay one step ahead of bad actors, retain talent and get support from top company executives.
By David Jones • Dec. 1, 2020 -
Technologists grapple with privacy, bias as AI inches closer to customers
Industry must contend with the ethical challenges of building AI as the technology expands in physical and digital customer touchpoints.
By Roberto Torres • Nov. 30, 2020 -
CISA's head was fired. How a leadership vacancy impacts the private sector
"I know that most, if not all, of my colleagues would currently pass on opportunities in the public sector, which is a shame," said RunSafe Security's Joe Saunders.
By Samantha Schwartz • Nov. 19, 2020 -
For Wells Fargo, tech, security and innovation drives risk management
Companies must look closely at technology as an operational risk, but neglecting innovation opens more windows for bad actors to enter, a Wells Fargo executive said.
By Katie Malone • Nov. 19, 2020 -
Remote work chipped away at zero trust skepticism, increased adoption
Organizations can adopt zero trust systematically. The "peanut butter spread" approach doesn't apply here.
By Samantha Schwartz • Nov. 13, 2020