Strategy: Page 11


  • Hacker in Work. High Speed Computer Keyboard Typing by Professional Hacker.
    Image attribution tooltip

    shutterstock.com/Virrage Images

    Image attribution tooltip
    Sponsored by Synopsys

    DevSecOps, done right, can achieve both speed and security in software development

    You don’t have to choose between speed or security if you do DevSecOps correctly. Learn how.

    April 15, 2024
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISO role shows significant gains amid corporate recognition of cyber risk

    A report from Moody’s Ratings shows CISOs and other senior-level cyber executives have become key decision makers within the C-suite. 

    By April 9, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Industry stakeholders seek 30-day delay for CIRCIA comments deadline

    Industry officials are asking for additional time to comb through hundreds of pages of detailed rules about disclosure of covered cyber incidents and ransom payments.

    By April 8, 2024
  • Rendered graphics with laptop, hand and dumbbell.
    Image attribution tooltip
    Permission granted by Fortinet
    Image attribution tooltip
    Sponsored by Fortinet

    The top 5 SecOps strategies to strengthen business in 2024

    Learn the importance of specialized security fueled by artificial intelligence and machine learning, why comprehensive coverage from attacks is critical and how to embrace new methods of supporting your IT teams.

    April 8, 2024
  • Dollars flowing through the tunnel with binary code texture.
    Image attribution tooltip
    adventtr via Getty Images
    Image attribution tooltip

    Cybersecurity venture funding remains weak, near three-year low

    Quarterly funding levels hit $2.3 billion in Q1 2024, a far cry from the $8 billion high the market achieved in the final quarter of 2021, according to Pinpoint Search Group.

    By April 5, 2024
  • A row big buildings with small shop storefronts underneath.
    Image attribution tooltip
    Mshake via Getty Images
    Image attribution tooltip

    What’s missing for SMBs? A solid cybersecurity culture

    Small businesses can be especially vulnerable to cyberattacks because of their limited resources, and few have employees on staff who truly understand the value of secure business operations.

    By Sue Poremba • April 1, 2024
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    Water woes: A federal push for cyber mitigation is highlighting the sector’s fault lines

    The water utility industry says they recognize the heightened threat environment, but the current federal push fails to account for their resource constraints.

    By March 28, 2024
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    CISA issues notice for long-awaited critical infrastructure reporting requirements

    CIRCIA will require covered entities to promptly disclose major cyber incidents and ransomware payments.

    By March 27, 2024
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Marsh launches group captive insurance firm for cyber

    The company wants to provide larger, financially stable companies with alternatives for managing risk, after years of volatility in pricing and coverage.

    By March 25, 2024
  • Photo illustration of a VF Corp. SEC filing.
    Image attribution tooltip

    Photo illustration: Industry Dive; US Securities and Exchange Commission

    Image attribution tooltip

    How companies describe cyber incidents in SEC filings

    The words businesses use in cybersecurity disclosures matter. They can channel confidence in the recovery process, potential impacts and legal liabilities.

    By March 19, 2024
  • Sponsored by Palo Alto Networks

    Security consultation is a non-negotiable for M&A activity

    Over 20% of external cloud services change monthly. Without visibility, it is easy to lose track of changes and prevent risks. Get the report to learn more.

    By Matt Kraning, CTO, Cortex, Palo Alto Networks • March 18, 2024
  • Header image for "56% of Business Leaders Are Incorporating AI Into Cybersecurity: Weekly Stat"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    Audit committees rank cybersecurity as top priority amid SEC crackdown

    Cyberattacks are just one of several rapidly changing threats confronting audit committees, according to the Center for Audit Quality and Deloitte.

    By Jim Tyson • March 14, 2024
  • Google corporate logo outside Google Germany offices in Berlin, Germany.
    Image attribution tooltip
    Sean Gallup / Getty Images News via Getty Images
    Image attribution tooltip

    Google Cloud CISO spots asymmetric advantage for AI in defense

    Organizations have the upper hand in using generative AI for security because it’s trained on data they own and context they tune against it, Phil Venables says.

    By March 13, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Ransomware festers as a top security challenge, US intel leaders say

    U.S. intelligence leaders warn ransomware activity is growing, despite high profile efforts to seize threat actors’ infrastructure.

    By March 12, 2024
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    What’s behind the demand for MDR and IAM systems

    It's not just the front door businesses need to protect. Organizations also have to recognize the damage threat actors can do once they’re inside.

    By Sue Poremba • March 7, 2024
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike dodges pricing war with Palo Alto Networks

    CEO George Kurtz called out CrowdStrike's largest competitor, dismissing Palo Alto Network's strategy of free incentives. "Free is never free," he said.

    By March 6, 2024
  • An open atrium filled with plants with stars crossing open floors.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    AWS CISO: Generative AI is just a tool, ‘not a magic wand’

    Attackers and defenders have access to the same capabilities in generative AI. Clear advantages for either side have yet to materialize.

    By March 5, 2024
  • Okta office
    Image attribution tooltip
    Courtesy of Okta
    Image attribution tooltip

    Why Okta is overhauling its priorities, culture around security

    CSO David Bradbury acknowledges the company’s brand is tarnished. “We need a track record of zero breaches. That’s what builds trust.”

    By March 1, 2024
  • Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    NIST makes it official: governance is a critical part of cybersecurity

    A collection of resources accompany CSF 2.0 to make the guidance easier for businesses to use and put into practice across their operations.

    By Feb. 29, 2024
  • Okta booth at RSA Conference on April 27, 2023 in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Okta reports ‘minimal’ financial impact following support portal attack

    The identity and access management firm is promising to make security a top priority, even though Okta’s CFO said the attack fallout is “not quantifiable.”

    By Feb. 29, 2024
  • Okta office
    Image attribution tooltip
    Courtesy of Okta
    Image attribution tooltip

    Okta, with a bruised reputation, rethinks security from the top down

    CSO David Bradbury detailed to Cybersecurity Dive what the identity and access management company got wrong and the security pledges it's making to customers.

    By Feb. 27, 2024
  • The front of the agency headquarters, reading "United States Security and Exchange Commission" and the number 450 as a man walks in a glass door at the bottom left of the frame.
    Image attribution tooltip
    Mark Wilson/Newsmakers via Getty Images
    Image attribution tooltip

    CFOs take backseat to CISOs on SEC cyber rules

    Less than half of finance chiefs are involved in the SEC's cybersecurity breach disclosure process, AuditBoard found.

    By Alexei Alexis • Feb. 27, 2024
  • Worker ant pushing heavy boulder up hill.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    LockBit group revives operations after takedown

    The comeback is no surprise to experts — and some think LockBit as a brand is dead — but the reemergence underscores persistent challenges for authorities.

    By Feb. 26, 2024
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks’ free incentives offer sparks investor anxiety

    The firm is giving away services and offering deferred billing to corral new customers into its consolidated cybersecurity platforms.

    By Feb. 21, 2024
  • Creative image depicting a ransomware attack.
    Image attribution tooltip
    bin kontan / Getty Images via Getty Images
    Image attribution tooltip

    State Department puts $10M bounty on AlphV ransomware group

    The prolific ransomware group and its affiliates are behind some of the most high-profile attacks in the last year.

    By Feb. 15, 2024