Strategy: Page 6


  • A blue screen with an unhappy face is depicted on a screen in the background behind glass and in front of a person looking down.
    Image attribution tooltip
    Anthony Kwan / Stringer via Getty Images
    Image attribution tooltip

    CrowdStrike software update at the root of a massive global IT outage

    A defective software update led to major disruptions in aviation, banking and other industries as Microsoft 365 services were impacted worldwide.

    By Updated July 19, 2024
  • The hospital instructor stands near the nurse to show her how to navigate the computer to insert notes.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Healthcare is an ‘easy victim’ for ransomware attacks. How hospitals can mitigate the damage.

    Limited resources in a highly connected ecosystem can make hospitals vulnerable, but planning ahead and implementing key protections could help thwart attacks.

    By Emily Olsen • July 19, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Majority of SEC civil fraud case against SolarWinds dismissed, but core remains

    The court ruling related to claims leading up to and immediately following the 2020 Sunburst supply chain hack.

    By Updated July 18, 2024
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Larger deals propel cybersecurity funding to 2-year high in Q2

    Bigger rounds for more mature startups fueled a sustained period of funding growth for the sector, according to Crunchbase.

    By July 18, 2024
  • Developer coding and programming on two with screens.
    Image attribution tooltip
    valentinrussanov via Getty Images
    Image attribution tooltip

    Nearly 1 in 3 software development professionals unaware of secure practices

    The knowledge gap, identified in a Linux Foundation report, comes as malicious hackers increasingly target critical vulnerabilities.

    By July 16, 2024
  • Young businessman working alone at his desk on desktop computer in an open space modern coworking office.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    Risk escalates as communication channels proliferate

    The chance of losing data to a breach rises in tandem with the number of channels — like email and file sharing — that an organization uses.

    By Robert Freedman • July 10, 2024
  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake allows admins to enforce MFA as breach investigations conclude

    Three months after an attacker targeted more than 100 customer environments, Snowflake is making it easier for existing customers to enforce MFA, but it isn’t requiring it.

    By July 9, 2024
  • A team of laboratory technicians conduct a series of tests on a chemical analyzer in a biological laboratory.
    Image attribution tooltip

    istockphoto.com/illustrissima

    Image attribution tooltip
    Sponsored by CybelAngel

    3 key lessons for CISOs from recent medical cyber quakes

    Medical-grade breaches result in casualties all around. So, what can be done to push back?

    July 8, 2024
  • Macquarie v Moab
    Image attribution tooltip
    Kevin Dietsch / Staff via Getty Images
    Image attribution tooltip

    Supreme Court ruling on Chevron doctrine may upend future cybersecurity regulation

    Experts expect new legal challenges against numerous agency cybersecurity requirements, including incident reporting mandates and rules governing critical infrastructure sectors.

    By Updated July 8, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft alerts additional customers of state-linked threat group attacks

    The company told customers the Midnight Blizzard attacks disclosed in January were more widespread than previously known.

    By June 28, 2024
  • Pumpjack in Fort Stockton, Texas.
    Image attribution tooltip
    Brandon Bell/Getty Image via Getty Images
    Image attribution tooltip

    Industrial cyberattacks fuel surge in OT cybersecurity spending

    Operators in mining, oil and gas, utilities and manufacturing are among the top spenders, according to ABI Research.

    By June 28, 2024
  • A person goes over insurance options
    Image attribution tooltip
    time99lek via Getty Images
    Image attribution tooltip

    Cyber insurance terms drive companies to invest more in security, report finds

    Though recovery costs continue to outpace coverage, companies are investing in network security to lower premiums and yield better policy terms.

    By June 26, 2024
  • A male IT specialist holds a laptop and discusses work with a female server technician in a data center, standing before a rack server cabinet with a cloud server icon and visualization.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Cloud security becoming top priority for companies worldwide

    Application sprawl and the sensitive nature of the data organizations place in the cloud is complicating security, Thales found.

    By June 25, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip

    Ransomware victims are becoming less likely to pay up

    Despite a jump in ransom demands last year, companies are plotting better defenses against attacks that can incur deep business interruption costs, Marsh said.

    By Justin Bachman • June 21, 2024
  • Man using facial recognition technology on city street
    Image attribution tooltip
    LeoPatrizi via Getty Images
    Image attribution tooltip

    MFA plays a rising role in major attacks, research finds

    Poor configurations and deliberate MFA bypasses were at the center of numerous attacks in recent months, Cisco Talos found.

    By June 18, 2024
  • A close up of a man in a blue suit with a multicolored tie gesturing while seated at a desk.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft president promises significant culture changes geared towards security

    Brad Smith detailed plans to tie compensation to security, as lawmakers raised new questions about the company’s commitment to transparency.

    By June 14, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft will take full ownership for security failures in House testimony

    Brad Smith, the company’s vice chair and president, will acknowledge extensive security lapses while outlining steps the company, industry and nation need to move forward.

    By June 13, 2024
  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    Snowflake-linked attacks are testing the cloud’s shared responsibility status quo

    Assigning responsibility for missing security controls is tricky. The burden is collective but cloud providers need to raise minimum standards, experts say.

    By June 13, 2024
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Rust Foundation leads the charge to improve critical systems security

    The foundation is standing up a consortium to boost the responsible use of the programming language at a time of heightened security risks.

    By June 12, 2024
  • Customers queue outside the Apple Store in Milan on September 22, 2023 in Milan, Italy.
    Image attribution tooltip
    Ming Yeung via Getty Images
    Image attribution tooltip

    Apple makes a password manager play in a heavily targeted market

    The new, standalone app Passwords places credential management front and center for Apple’s massive user base.

    By June 11, 2024
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Telecom, media and tech companies are cyber defense standouts: Moody’s

    Cybersecurity spending in the sector doubled during the past five years, accounting for 10% of companies’ technology budgets in 2023, the credit ratings and research firm said.

    By June 7, 2024
  • Liat Hayun, co-founder and CEO, Eureka Security.
    Image attribution tooltip
    Permission granted by Eureka Security
    Image attribution tooltip

    Tenable to acquire Eureka Security for greater visibility into cloud data environment

    The deal marks the latest acquisition in a market undergoing pricing adjustments and increased pressure to offer unified platforms.

    By June 6, 2024
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike soars above industry spending concerns, digs at rivals

    The cybersecurity firm defied growing industry pressures on cybersecurity revenue while continuing to jab rivals Microsoft and Palo Alto Networks. 

    By June 5, 2024
  • A group of three software developers converse in an office setting
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Security concerns mount as businesses deploy AI coding tools

    Organizations are deploying the technology without enough protocols to ensure safe, secure use.

    By Lindsey Wilkinson • June 5, 2024
  • cybersecurity, talent shortage, retention, leadership
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip
    Opinion

    How to identify and implement security automation use cases

    It might be a “fun” engineering challenge to see what is possible to automate, but often the results will not justify the expense and effort, Gartner’s Kevin Schmidt writes.

    By Kevin Schmidt • June 4, 2024