Strategy: Page 4


  • AI-washing, Oddity
    Image attribution tooltip
    Poca Wander Stock via Getty Images
    Image attribution tooltip

    Cyber insurance keeps growing, as threats spur competition

    Concerns remain about aggregation risk as highlighted by the July outage of Microsoft Windows devices, according to a report from Moody’s Ratings.

    By Sept. 9, 2024
  • The sun sets on the facade of the U.S. Treasury Department.
    Image attribution tooltip
    mrbfaust via Getty Images
    Image attribution tooltip

    Key cyber insurance stakeholders urge government to help close $900B in uncovered risk

    Marsh McLennan and Zurich Insurance Group issued a white paper urging a public-private partnership to help tackle a growing coverage gap. The White House is working on a plan. 

    By Sept. 6, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House launches cybersecurity hiring sprint to help fill 500,000 job openings

    National Cyber Director Harry Coker Jr. unveiled the program as part of an effort to fill a continued gap in cyber, technology and AI positions.

    By Sept. 5, 2024
  • Binary code abstract background with US $100 dollar banknotes.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Infosec spending to hit 3-year growth peak, reach $212B next year: Gartner

    The continuation of annual double-digit growth rates, 15% next year, comes as organizations consolidate spending and reassess EPP and EDR needs.

    By Sept. 5, 2024
  • Microsoft headquarters in Redmond, Washington.
    Image attribution tooltip
    David Ryder/Getty Images via Getty Images
    Image attribution tooltip

    Microsoft is training developers on the intricacies of threat intelligence

    Cybercrime wonk Sherrod DeGrippo is taking Microsoft’s software developers and engineers on a journey into her world, the depths of threat intelligence.

    By Sept. 4, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches cyber incident reporting portal to streamline breach disclosure

    The secure portal is designed to encourage faster and more robust information sharing about malicious attacks and critical vulnerabilities.

    By Aug. 30, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike takes a revenue hit as global IT outage reckoning lingers

    Sales are taking longer to close and the cybersecurity vendor is offering discounts to stem potential customer losses.

    By Aug. 29, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    SentinelOne fields inquiries from new customers following global IT outage linked to CrowdStrike

    Companies looking to diversify their risk from disruption are approaching SentinelOne, a week after similar customer movement was reported by Palo Alto Networks. 

    By Aug. 28, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA officials credit Microsoft security log expansion for improved threat visibility

    CISA officials say they plan to hold Microsoft accountable to ensure the company lives up to its commitments.

    By Aug. 27, 2024
  • A pair of binoculars covered with code, indicating a cybersecurity breach
    Image attribution tooltip
    Marco_Piunti via Getty Images
    Image attribution tooltip

    Marketing data security threats are rising: Where CMOs see gaps

    While marketers prioritize working with data security teams, effective communication remains a struggle, according to research from the CMO Council and KPMG. 

    By Peter Adams • Aug. 23, 2024
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    US, Australian authorities lead international push to adopt event logging

    State-linked and criminal threat groups are using living-off-the-land techniques to hide their hacking activities behind regular security tools.

    By Aug. 22, 2024
  • Snowflake logo on one of the data cloud company's offices.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    After a wave of attacks, Snowflake insists security burden rests with customers

    The cloud-based data warehouse vendor remains “slightly muted” about the attacks on its customers because it wasn’t breached, CEO Sridhar Ramaswamy said.

    By Aug. 22, 2024
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Insurance coverage drives cyber risk reduction for companies, researchers say

    Companies with cyber coverage are better able to detect and respond to attacks, according to a Forrester report.

    By Aug. 21, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip
    Opinion

    3 tips to building a robust AI security strategy

    Organizations can reap bigger benefits from AI with guardrails that combine human oversight, strong underlying security architecture and technical controls.

    By Anton Chuvakin • Aug. 21, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO touts leads from CrowdStrike fallout

    In the wake of the massive IT outage, some CrowdStrike customers have entered talks with Palo Alto Networks in search of a new provider.

    By Aug. 20, 2024
  • CIO Dive Editor Roberto Torres discusses cybersecurity strategy with the City of Santa Monica CIO Feroz Merchhiya during a CIO Dive virtual event on August 14, 2024.
    Image attribution tooltip

    Permission granted by Industry Dive.

    Image attribution tooltip

    3 CIO lessons for maximizing cybersecurity investments

    Securing resources has gotten easier, said Feroz Merchhiya, City of Santa Monica CIO. But that hasn't diminished tech leaders' role in showing the value.

    By Lindsey Wilkinson • Aug. 19, 2024
  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Companies aren’t as resilient against cyber risks as they think

    Most companies fall short on business continuity as malicious threat activity continues to rise, a Cohesity study found.

    By Aug. 19, 2024
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Microsoft mandates MFA for all Azure users

    The company said it will require the identity and access control for all Azure sign-ins starting in October.

    By Aug. 19, 2024
  • Tines story graphic image.
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    The biggest blockers to AI adoption, according to CISOs (and how to remove them)

    74% of CISOs agree that the benefits of AI outweigh the risks. So what’s holding them back? Discover how to remove the biggest blockers to AI innovation.

    By Eoin Hinchy, CEO and co-founder, Tines • Aug. 19, 2024
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    It’s time to stop thinking of threat groups as supervillains, experts say

    “These villains do not have superpowers. We should not treat them like they do,” CISA Director Jen Easterly said in a keynote at Black Hat.

    By Aug. 15, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House details $11M plan to help secure open source

    National Cyber Director Harry Coker Jr., speaking at Def Con in Las Vegas, says federal assistance must be bolstered by more ownership among the community.

    By Aug. 14, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    M&A activity can amplify ransomware insurance losses, research finds

    The financial severity of claims related to ransomware attacks increased more than 400% from 2022 to 2023, the study found.

    By Alexei Alexis • Aug. 14, 2024
  • Keynote stage for Black Hat 2024 at Michelob Ultra Arena in Las Vegas on August 7, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA director: Cybersecurity is ‘not an impossible problem’

    In Jen Easterly's view, the solution to the industry's pains lies in secure by design. “We got ourselves into this, we have to get ourselves out,” she said during a media briefing at Black Hat.

    By Aug. 13, 2024
  • A blue screen with an unhappy face is depicted on a screen in the background behind glass and in front of a person looking down.
    Image attribution tooltip
    Anthony Kwan / Stringer via Getty Images
    Image attribution tooltip
    Opinion

    Misguided lessons from CrowdStrike outage could be disastrous

    Some leaders think moving slowly is safer in light of global outages, but this approach is wrong when addressing cyber vulnerabilities and will lead to bigger problems.

    By Deepak Kumar • Aug. 13, 2024
  • Black Hat logo at Black Hat 2024 in Las Vegas on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft Deputy CISO recounts responding to the CrowdStrike outage

    The industry’s collective response to the massive outage underscored for Ann Johnson its ability to come together and put competitive interests aside.

    By Aug. 12, 2024