Strategy: Page 6
-
CrowdStrike software update at the root of a massive global IT outage
A defective software update led to major disruptions in aviation, banking and other industries as Microsoft 365 services were impacted worldwide.
By David Jones • Updated July 19, 2024 -
Healthcare is an ‘easy victim’ for ransomware attacks. How hospitals can mitigate the damage.
Limited resources in a highly connected ecosystem can make hospitals vulnerable, but planning ahead and implementing key protections could help thwart attacks.
By Emily Olsen • July 19, 2024 -
Trendline
Risk Management
Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues.
By Cybersecurity Dive staff -
Majority of SEC civil fraud case against SolarWinds dismissed, but core remains
The court ruling related to claims leading up to and immediately following the 2020 Sunburst supply chain hack.
By David Jones • Updated July 18, 2024 -
Larger deals propel cybersecurity funding to 2-year high in Q2
Bigger rounds for more mature startups fueled a sustained period of funding growth for the sector, according to Crunchbase.
By Matt Kapko • July 18, 2024 -
Nearly 1 in 3 software development professionals unaware of secure practices
The knowledge gap, identified in a Linux Foundation report, comes as malicious hackers increasingly target critical vulnerabilities.
By David Jones • July 16, 2024 -
Risk escalates as communication channels proliferate
The chance of losing data to a breach rises in tandem with the number of channels — like email and file sharing — that an organization uses.
By Robert Freedman • July 10, 2024 -
Snowflake allows admins to enforce MFA as breach investigations conclude
Three months after an attacker targeted more than 100 customer environments, Snowflake is making it easier for existing customers to enforce MFA, but it isn’t requiring it.
By Matt Kapko • July 9, 2024 -
Sponsored by CybelAngel
3 key lessons for CISOs from recent medical cyber quakes
Medical-grade breaches result in casualties all around. So, what can be done to push back?
July 8, 2024 -
Supreme Court ruling on Chevron doctrine may upend future cybersecurity regulation
Experts expect new legal challenges against numerous agency cybersecurity requirements, including incident reporting mandates and rules governing critical infrastructure sectors.
By David Jones • Updated July 8, 2024 -
Microsoft alerts additional customers of state-linked threat group attacks
The company told customers the Midnight Blizzard attacks disclosed in January were more widespread than previously known.
By David Jones • June 28, 2024 -
Industrial cyberattacks fuel surge in OT cybersecurity spending
Operators in mining, oil and gas, utilities and manufacturing are among the top spenders, according to ABI Research.
By Matt Kapko • June 28, 2024 -
Cyber insurance terms drive companies to invest more in security, report finds
Though recovery costs continue to outpace coverage, companies are investing in network security to lower premiums and yield better policy terms.
By David Jones • June 26, 2024 -
Cloud security becoming top priority for companies worldwide
Application sprawl and the sensitive nature of the data organizations place in the cloud is complicating security, Thales found.
By David Jones • June 25, 2024 -
Ransomware victims are becoming less likely to pay up
Despite a jump in ransom demands last year, companies are plotting better defenses against attacks that can incur deep business interruption costs, Marsh said.
By Justin Bachman • June 21, 2024 -
MFA plays a rising role in major attacks, research finds
Poor configurations and deliberate MFA bypasses were at the center of numerous attacks in recent months, Cisco Talos found.
By David Jones • June 18, 2024 -
Microsoft president promises significant culture changes geared towards security
Brad Smith detailed plans to tie compensation to security, as lawmakers raised new questions about the company’s commitment to transparency.
By David Jones • June 14, 2024 -
Microsoft will take full ownership for security failures in House testimony
Brad Smith, the company’s vice chair and president, will acknowledge extensive security lapses while outlining steps the company, industry and nation need to move forward.
By David Jones • June 13, 2024 -
Snowflake-linked attacks are testing the cloud’s shared responsibility status quo
Assigning responsibility for missing security controls is tricky. The burden is collective but cloud providers need to raise minimum standards, experts say.
By Matt Kapko • June 13, 2024 -
Rust Foundation leads the charge to improve critical systems security
The foundation is standing up a consortium to boost the responsible use of the programming language at a time of heightened security risks.
By David Jones • June 12, 2024 -
Apple makes a password manager play in a heavily targeted market
The new, standalone app Passwords places credential management front and center for Apple’s massive user base.
By Matt Kapko • June 11, 2024 -
Telecom, media and tech companies are cyber defense standouts: Moody’s
Cybersecurity spending in the sector doubled during the past five years, accounting for 10% of companies’ technology budgets in 2023, the credit ratings and research firm said.
By Matt Kapko • June 7, 2024 -
Tenable to acquire Eureka Security for greater visibility into cloud data environment
The deal marks the latest acquisition in a market undergoing pricing adjustments and increased pressure to offer unified platforms.
By David Jones • June 6, 2024 -
CrowdStrike soars above industry spending concerns, digs at rivals
The cybersecurity firm defied growing industry pressures on cybersecurity revenue while continuing to jab rivals Microsoft and Palo Alto Networks.
By David Jones • June 5, 2024 -
Security concerns mount as businesses deploy AI coding tools
Organizations are deploying the technology without enough protocols to ensure safe, secure use.
By Lindsey Wilkinson • June 5, 2024 -
Opinion
How to identify and implement security automation use cases
It might be a “fun” engineering challenge to see what is possible to automate, but often the results will not justify the expense and effort, Gartner’s Kevin Schmidt writes.
By Kevin Schmidt • June 4, 2024