Strategy: Page 3


  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    United Airlines leaned on real-time data to recover from the CrowdStrike outage

    The airline modernized its technology foundations with better customer experiences in mind. Then, a major software outage underscored the importance of live data.

    By Matt Ashare • Oct. 4, 2024
  • Exterior of CrowdStrike office in Sunnyvale, California.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    What’s next for CrowdStrike on the road to repair its reputation?

    The cybersecurity vendor finds itself operating from a vulnerable position. Efforts to earn back trust are complex and some require industrywide support.

    By Oct. 3, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Two-thirds of healthcare organizations hit by ransomware in past year: survey

    Nearly 40% of healthcare organizations reported it took more than a month to recover after an attack, according to the survey by cybersecurity firm Sophos.

    By Emily Olsen • Oct. 2, 2024
  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

    By Oct. 2, 2024
  • A over the shoulder shot of woman using smartphone with Two-Factor Authentication security while logging to laptop.
    Image attribution tooltip
    gahsoon via Getty Images
    Image attribution tooltip

    Customers are done with passwords. Do businesses have a solution?

    Research shows customers are frustrated with the login experience, and the friction can cost businesses customers.

    By Kristen Doerer • Sept. 30, 2024
  • Man studying see-through display depicting computer code.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    For Google to reduce memory-safety defects, it focused on new code

    Google’s experience provides software developers a roadmap to address one of the most persistent security problems: memory-safety CVEs.

    By Sept. 26, 2024
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike CEO pushes ‘resilient by design’ framework, promising changes

    The cybersecurity vendor is embracing a new business framework to address security deployment lapses and the fragility of interconnected systems.

    By Sept. 26, 2024
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

    By Sept. 26, 2024
  • Sen. Angus King discussed a report on the implementation of cybersecurity recommendations during a presentation on Sept. 19, 2024 in Washington D.C.
    Image attribution tooltip
    Permission granted by FDD
    Image attribution tooltip

    Cyber commission seeks detailed plan to secure high-risk infrastructure

    A report said most recommendations from the Cyberspace Solarium Commission are near completion, but also called for greater private-sector collaboration and insurance reforms.

    By Sept. 25, 2024
  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.

    By Sept. 25, 2024
  • an employee looks into a screen showing a chatbot interface
    Image attribution tooltip
    Laurence dutton via Getty Images
    Image attribution tooltip

    Data privacy concerns swirl around generative AI adoption

    IT and business professionals fear the technology's adoption can lead to data leakage, according to a Deloitte report.

    By Roberto Torres • Sept. 25, 2024
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft names deputy CISOs, flushes dead accounts as part of internal security overhaul

    The company released a progress report on efforts to revamp its internal security culture and governance.

    By Sept. 23, 2024
  • Man working while wearing glasses
    Image attribution tooltip
    Jacob Wackerhausen via Getty Images
    Image attribution tooltip
    Sponsored by University of New Hampshire

    Leadership in learning: Cultivating resilient cyber teams through education

    Promoting cybersecurity in the workplace is essential. Empowering staff begins with high-quality online programs.

    Sept. 23, 2024
  • Kevin Mandia’s 5 question confidence test for CISOs

    For most organizations, cyberthreats are too imposing to get bogged down in low-impact exercises. Mandiant’s founder advises executives to look for a security mindset above all else.

    By Sept. 20, 2024
  • Binary code of ones and zeros
    Image attribution tooltip
    deberrar/Getty Images via Getty Images
    Image attribution tooltip

    Generative AI raises security concerns among IT leaders

    Executives worry their organization lacks the ability to protect applications and workloads, according to a Flexential survey.

    By Lindsey Wilkinson • Sept. 19, 2024
  • View of the Seattle skyline
    Image attribution tooltip
    Abbie Parr/Getty Images via Getty Images
    Image attribution tooltip

    Port of Seattle official flags a cyber dilemma, ‘one-way street’ with federal agencies

    A ransomware atttack disrupted the Seattle-Tacoma International Airport for weeks. Part of the problem, one official said, is that federal cyber recommendations are not timely.

    By Sept. 19, 2024
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Open source maintainers, under security pressure, remain largely unpaid after XZ Utils

    A report by Tidelift shows an equity gap remains between open source developers and well-resourced software users who are pushing for higher security standards.

    By Sept. 17, 2024
  • graphic image depicting a future desktop
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    Enterprises are investing in AI copilots. But do they go far enough?

    Enterprises are embracing AI copilots. But can they realize their impact?

    By Eoin Hinchy, CEO and co-founder, Tines • Sept. 16, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    Microsoft, working with security partners, pledges better deployment, testing collaboration

    Following a summit with U.S. and European partners, the company is working to build additional resiliency features to prevent a repeat of the historic global IT outage linked to CrowdStrike.

    By Updated Sept. 13, 2024
  • Mastercard point of sale, retail
    Image attribution tooltip
    Courtesy of Mastercard
    Image attribution tooltip

    Mastercard’s $2.65B Recorded Future acquisition to buttress its security business

    While Mastercard has cybersecurity oversight needs for its cards and payments businesses, it also sells security services to other companies, including banks and fintechs. 

    By Lynne Marek • Sept. 13, 2024
  • Two male electrical engineers in safety uniform work together at a factory site control room.
    Image attribution tooltip
    CandyRetriever via Getty Images
    Image attribution tooltip

    Most OT environments have at least 4 remote access tools, report finds

    Claroty warned the prevalence of remote access tool sprawl, often linked to ransomware, raises the risk of malicious activity.

    By Sept. 12, 2024
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Network security market breaks streak of declining growth in Q2: Dell’Oro Group

    The rebound arrives as heightened levels of malicious activity are targeting firewalls, the largest product segment in the market.

    By Sept. 12, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip

    How to manage the rising tide of CVEs

    As the volume and complexity of vulnerabilities grows, organizations are struggling to manage and mitigate the security defects. 

    By Rosalyn Page • Sept. 11, 2024
  • a row of job seekers seated in an office setting against brick wall
    Image attribution tooltip
    skynesher via Getty Images
    Image attribution tooltip

    Global cybersecurity workforce growth flatlines, stalling at 5.5M pros

    ISC2’s annual report draws some troubling conclusions for the state of cyber defense. Budget cuts, layoffs and hiring freezes are exacerbating a global staffing shortage.

    By Sept. 11, 2024
  • Coin stacks sitting on blue financial graph background. Horizontal composition with selective focus and copy space.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Security budgets continue modest growth, but staff hiring slows considerably, research finds

    The report by IANS Research and Artico Search shows security priorities are clashing with economic realities.  

    By Sept. 10, 2024