Strategy: Page 5


  • Binary code of ones and zeros
    Image attribution tooltip
    deberrar/Getty Images via Getty Images
    Image attribution tooltip

    Generative AI raises security concerns among IT leaders

    Executives worry their organization lacks the ability to protect applications and workloads, according to a Flexential survey.

    By Lindsey Wilkinson • Sept. 19, 2024
  • View of the Seattle skyline
    Image attribution tooltip
    Abbie Parr/Getty Images via Getty Images
    Image attribution tooltip

    Port of Seattle official flags a cyber dilemma, ‘one-way street’ with federal agencies

    A ransomware atttack disrupted the Seattle-Tacoma International Airport for weeks. Part of the problem, one official said, is that federal cyber recommendations are not timely.

    By Sept. 19, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Open source maintainers, under security pressure, remain largely unpaid after XZ Utils

    A report by Tidelift shows an equity gap remains between open source developers and well-resourced software users who are pushing for higher security standards.

    By Sept. 17, 2024
  • graphic image depicting a future desktop
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    Enterprises are investing in AI copilots. But do they go far enough?

    Enterprises are embracing AI copilots. But can they realize their impact?

    By Eoin Hinchy, CEO and co-founder, Tines • Sept. 16, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    Microsoft, working with security partners, pledges better deployment, testing collaboration

    Following a summit with U.S. and European partners, the company is working to build additional resiliency features to prevent a repeat of the historic global IT outage linked to CrowdStrike.

    By Updated Sept. 13, 2024
  • Mastercard point of sale, retail
    Image attribution tooltip
    Courtesy of Mastercard
    Image attribution tooltip

    Mastercard’s $2.65B Recorded Future acquisition to buttress its security business

    While Mastercard has cybersecurity oversight needs for its cards and payments businesses, it also sells security services to other companies, including banks and fintechs. 

    By Lynne Marek • Sept. 13, 2024
  • Two male electrical engineers in safety uniform work together at a factory site control room.
    Image attribution tooltip
    CandyRetriever via Getty Images
    Image attribution tooltip

    Most OT environments have at least 4 remote access tools, report finds

    Claroty warned the prevalence of remote access tool sprawl, often linked to ransomware, raises the risk of malicious activity.

    By Sept. 12, 2024
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Network security market breaks streak of declining growth in Q2: Dell’Oro Group

    The rebound arrives as heightened levels of malicious activity are targeting firewalls, the largest product segment in the market.

    By Sept. 12, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip

    How to manage the rising tide of CVEs

    As the volume and complexity of vulnerabilities grows, organizations are struggling to manage and mitigate the security defects. 

    By Rosalyn Page • Sept. 11, 2024
  • a row of job seekers seated in an office setting against brick wall
    Image attribution tooltip
    skynesher via Getty Images
    Image attribution tooltip

    Global cybersecurity workforce growth flatlines, stalling at 5.5M pros

    ISC2’s annual report draws some troubling conclusions for the state of cyber defense. Budget cuts, layoffs and hiring freezes are exacerbating a global staffing shortage.

    By Sept. 11, 2024
  • Coin stacks sitting on blue financial graph background. Horizontal composition with selective focus and copy space.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Security budgets continue modest growth, but staff hiring slows considerably, research finds

    The report by IANS Research and Artico Search shows security priorities are clashing with economic realities.  

    By Sept. 10, 2024
  • AI-washing, Oddity
    Image attribution tooltip
    Poca Wander Stock via Getty Images
    Image attribution tooltip

    Cyber insurance keeps growing, as threats spur competition

    Concerns remain about aggregation risk as highlighted by the July outage of Microsoft Windows devices, according to a report from Moody’s Ratings.

    By Sept. 9, 2024
  • The sun sets on the facade of the U.S. Treasury Department.
    Image attribution tooltip
    mrbfaust via Getty Images
    Image attribution tooltip

    Key cyber insurance stakeholders urge government to help close $900B in uncovered risk

    Marsh McLennan and Zurich Insurance Group issued a white paper urging a public-private partnership to help tackle a growing coverage gap. The White House is working on a plan. 

    By Sept. 6, 2024
  • National Cyber Director Harry Coker speaks in Washington.
    Image attribution tooltip
    Permission granted by Information Technology Industry Council
    Image attribution tooltip

    White House launches cybersecurity hiring sprint to help fill 500,000 job openings

    National Cyber Director Harry Coker Jr. unveiled the program as part of an effort to fill a continued gap in cyber, technology and AI positions.

    By Sept. 5, 2024
  • Binary code abstract background with US $100 dollar banknotes.
    Image attribution tooltip
    Viorika via Getty Images
    Image attribution tooltip

    Infosec spending to hit 3-year growth peak, reach $212B next year: Gartner

    The continuation of annual double-digit growth rates, 15% next year, comes as organizations consolidate spending and reassess EPP and EDR needs.

    By Sept. 5, 2024
  • Microsoft headquarters in Redmond, Washington.
    Image attribution tooltip
    David Ryder/Getty Images via Getty Images
    Image attribution tooltip

    Microsoft is training developers on the intricacies of threat intelligence

    Cybercrime wonk Sherrod DeGrippo is taking Microsoft’s software developers and engineers on a journey into her world, the depths of threat intelligence.

    By Sept. 4, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches cyber incident reporting portal to streamline breach disclosure

    The secure portal is designed to encourage faster and more robust information sharing about malicious attacks and critical vulnerabilities.

    By Aug. 30, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike takes a revenue hit as global IT outage reckoning lingers

    Sales are taking longer to close and the cybersecurity vendor is offering discounts to stem potential customer losses.

    By Aug. 29, 2024
  • A computer in the foreground shows a blue screen with the words "recovery," and in the background people with suitcases walk by in front of large windows overlooking an airport tarmac.
    Image attribution tooltip
    Nathan Howard / Stringer via Getty Images
    Image attribution tooltip

    SentinelOne fields inquiries from new customers following global IT outage linked to CrowdStrike

    Companies looking to diversify their risk from disruption are approaching SentinelOne, a week after similar customer movement was reported by Palo Alto Networks. 

    By Aug. 28, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA officials credit Microsoft security log expansion for improved threat visibility

    CISA officials say they plan to hold Microsoft accountable to ensure the company lives up to its commitments.

    By Aug. 27, 2024
  • A pair of binoculars covered with code, indicating a cybersecurity breach
    Image attribution tooltip
    Marco_Piunti via Getty Images
    Image attribution tooltip

    Marketing data security threats are rising: Where CMOs see gaps

    While marketers prioritize working with data security teams, effective communication remains a struggle, according to research from the CMO Council and KPMG. 

    By Peter Adams • Aug. 23, 2024
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Techa Tungateja via Getty Images
    Image attribution tooltip

    US, Australian authorities lead international push to adopt event logging

    State-linked and criminal threat groups are using living-off-the-land techniques to hide their hacking activities behind regular security tools.

    By Aug. 22, 2024
  • Snowflake logo on one of the data cloud company's offices.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    After a wave of attacks, Snowflake insists security burden rests with customers

    The cloud-based data warehouse vendor remains “slightly muted” about the attacks on its customers because it wasn’t breached, CEO Sridhar Ramaswamy said.

    By Aug. 22, 2024
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Insurance coverage drives cyber risk reduction for companies, researchers say

    Companies with cyber coverage are better able to detect and respond to attacks, according to a Forrester report.

    By Aug. 21, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip
    Opinion

    3 tips to building a robust AI security strategy

    Organizations can reap bigger benefits from AI with guardrails that combine human oversight, strong underlying security architecture and technical controls.

    By Anton Chuvakin • Aug. 21, 2024