Strategy: Page 29


  • Sponsored
    Image attribution tooltip
    Permission granted by Jacob Erling
    Image attribution tooltip
    Sponsored by Avanan

    The next generation of email security

    Now, with a single approval of an API, every line of cloud business communication can be secured.

    Feb. 16, 2021
  • Sponsored
    Image attribution tooltip

    dragana991ā€‹/iStock

    Image attribution tooltip
    Sponsored by Code42

    The downside of the remote work shift: 85% increase in Insider Risk

    The Code42 2021 Data Exposure Report reveals a perfect storm for Insider Risk.

    Feb. 16, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineāž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • laptop, coding, code, cybersecurity
    Image attribution tooltip
    Rangel, David. [photograph]. Retrieved from https://unsplash.com/photos/4m7gmLNr3M0.
    Image attribution tooltip

    Software supply chain hacks highlight an ugly truth: The build process is broken

    Software makers are coming to terms with security gaps they knew existed as the fallout from the SolarWinds hack continues.

    By Samantha Schwartz • Feb. 11, 2021
  • Image attribution tooltip
    Naomi Eide
    Image attribution tooltip

    FireEye reports record revenue in first report since Red Team hack

    The company's discovery of the SolarWinds attack has fueled additional customer demand, which should be reflected in deferred revenue during 2021.

    By Feb. 3, 2021
  • Opinion

    Gartner: Steps to respond to a supply chain attack

    Businesses require tools to detect the lateral movement from an initial compromise and an incident response plan.

    By Peter Firstbrook • Feb. 1, 2021
  • Supply chain attacks renew focus on limiting privileged access to cloud data

    Supply chain attacks and rapid shifts to cloud data storage have led companies to reduce access by third-party vendors and employees to sensitive data.

    By Jan. 29, 2021
  • GDPR, EU, data privacy
    Image attribution tooltip
    Tanaonte via Getty Images
    Image attribution tooltip

    GDPR regulators are sinking their teeth into violators. 2020's fines are proof.

    The European regulation took about a year before major fines were introduced. Watchdogs are in a grey area of harnessing better privacy standards and having zero tolerance for negligent or intentional violations.

    By Samantha Schwartz • Jan. 28, 2021
  • Image attribution tooltip
    White House
    Image attribution tooltip

    Biden campaign cyber chief named federal CISO

    Cybersecurity veterans praised the appointment, highlighting Chris DeRusha's extensive government and private sector experience, useful for navigating SolarWinds fallout.

    By Jan. 27, 2021
  • Image attribution tooltip
    DESIGNECOLOGIST. [Photograph]. Retrieved from Unsplash.
    Image attribution tooltip

    Cyberthreat trends in the remote work landscape

    With more workers logging in from home, companies face new cybersecurity challenges and opportunities.

    By Jan. 25, 2021
  • Cybersecurity market set to reach $60B in 2021: report

    Unknown threats, like the ones emerging from the SolarWinds hack, are shaping the future of investments.

    By Samantha Schwartz • Jan. 22, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Technology's greatest supply chain challenge? Establishing trust

    Geopolitics play a role in how the private sector purchases technology, influencing what on- and offshore vendors companies decide to trust.

    By Samantha Schwartz • Jan. 21, 2021
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    Cyber defense panel sees more private sector coordination following SolarWinds

    Defense and intelligence experts say federal agencies need to strengthen private sector support, intelligence sharing to prevent the next big nation-state attack. 

    By Jan. 20, 2021
  • Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How one hospital is defending against ransomware

    By the time the Ryuk ransomware alert was issued, Rush Memorial Hospital had at least two risk mitigation measures: improved backup as a service and a systems engineer with an evasion plan. 

    By Samantha Schwartz • Dec. 22, 2020
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    SolarWinds breach reminds companies to be proactive in managing trust, disclosure

    Legal and forensics experts warn CISOs about supply chain monitoring and transparency amid fallout from historic attack. 

    By Dec. 22, 2020
  • Image attribution tooltip
    Carson Masterson / Unsplash
    Image attribution tooltip

    After years in the lab, IBM ready to take homomorphic encryption into the mainstream

    Increased use of hybrid cloud and a successful pilot program help build the case for processing highly-encrypted data in transit.

    By Dec. 18, 2020
  • A clinical trial participant is given Pfizer and BioNTech's experimental COVID-19 vaccine at the University of Maryland School of Medicine
    Image attribution tooltip
    Permission granted by University of Maryland School of Medicine
    Image attribution tooltip

    COVID-19 vaccine supply chain has cyberthreats hidden in plain sight

    Outdated systems throughout vaccine distribution logistics carry unprecedented cyberthreats. 

    By Samantha Schwartz • Dec. 16, 2020
  • National defense bill is heavy on cyber. What it means for the private sector.

    The recommendations are intended to remedy areas of distrust and construct a more resilient cyber infrastructure, regardless of sector.

    By Samantha Schwartz • Dec. 7, 2020
  • cyberattack, privacy, connection
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    Why some industries are more secure than others

    Threats go beyond industry and target organizations depending on business size. Company size is a factor, but so is investment in cyber defense. 

    By Sue Poremba • Dec. 7, 2020
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    NERC expands IT-focused cybersecurity program as hackers target grid operations tech

    Previously focused on utility operations IT, the Cybersecurity Risk Information Sharing Program will now include two pilots scanning for threats to operational technologies.

    By Robert Walton • Dec. 4, 2020
  • Former Vice President of the United States Joe Biden speaking with supporters at a community event at Sun City MacDonald Ranch in Henderson, Nevada.
    Image attribution tooltip
    The image by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    What security experts expect from Biden's cyber strategy

    The private sector is playing a more active role in national security. Now, security professionals are hungry for even more cross-sector collaboration.

    By Samantha Schwartz • Dec. 3, 2020
  • Proactive technology upgrades prevent security nightmares, report finds

    Successful enterprises stay one step ahead of bad actors, retain talent and get support from top company executives.

    By Dec. 1, 2020
  • Technologists grapple with privacy, bias as AI inches closer to customers

    Industry must contend with the ethical challenges of building AI as the technology expands in physical and digital customer touchpoints.

    By Roberto Torres • Nov. 30, 2020
  • CISA's head was fired. How a leadership vacancy impacts the private sector

    "I know that most, if not all, of my colleagues would currently pass on opportunities in the public sector, which is a shame," said RunSafe Security's Joe Saunders.

    By Samantha Schwartz • Nov. 19, 2020
  • Wells Fargo branch exterior
    Image attribution tooltip
    Courtesy of Wells Fargo multimedia resources
    Image attribution tooltip

    For Wells Fargo, tech, security and innovation drives risk management

    Companies must look closely at technology as an operational risk, but neglecting innovation opens more windows for bad actors to enter, a Wells Fargo executive said. 

    By Nov. 19, 2020
  • Remote work chipped away at zero trust skepticism, increased adoption

    Organizations can adopt zero trust systematically. The "peanut butter spread" approach doesn't apply here.

    By Samantha Schwartz • Nov. 13, 2020