Strategy: Page 13


  • Group of senior leaders discussing technology initiatives
    Image attribution tooltip
    pixelfit via Getty Images
    Image attribution tooltip

    Generative AI tips and warnings from 5 providers

    Understanding model limitations and keeping humans in the loop is critical to productive adoption of AI, according to several software leaders.

    By Lindsey Wilkinson • Aug. 25, 2023
  • A textbox with five stars blocking out a word and a lock to simulate password protection.
    Image attribution tooltip
    kaedeezign via Getty Images
    Image attribution tooltip
    Opinion

    Government investigation puts spotlight on password insecurity

    A team working for the Department of Interior’s inspector general successfully cracked 1 in 5 active user passwords, a ratio that highlights traps in cybersecurity standards, Mike Kosask from LastPass writes.

    By Michael Kosak • Aug. 24, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Image of cloud data center, 3d rendering.
    Image attribution tooltip
    mesh cube via Getty Images
    Image attribution tooltip

    For security to benefit from AI, companies need to shore up their data

    CISOs need to address the structure, management and curation of data as they pursue benefits from generative AI, according to an IDC report.

    By Aug. 24, 2023
  • Hourglass projects a dollar sign as shadow against a black/grey background
    Image attribution tooltip
    LdF via Getty Images
    Image attribution tooltip

    Ransomware attack dwell times fall, pressuring companies to quickly respond

    The median dwell time for ransomware attacks hit a new low of five days in the first half of the year, according to Sophos.

    By Aug. 23, 2023
  • Header image for "Will Automation Cause Finance Job Losses After All?"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    SentinelOne pursues potential sale amid slow growth, report says

    The cybersecurity firm recently announced job cuts and is competing in a turbulent market in recent months.

    By Aug. 22, 2023
  • An employee speaks during a meeting on a SaaS video conferencing solution.
    Image attribution tooltip
    SDI Productions via Getty Images
    Image attribution tooltip

    Zoom’s AI terms overhaul sets stage for broader data use scrutiny

    The shift to adopt generative AI has created tension between SaaS vendors' data desires and enterprises' security concerns.

    By Lindsey Wilkinson • Aug. 22, 2023
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks posts strong Q4 amid consolidation, new SEC rules

    Despite spooking analysts with an unusual late Friday earnings presentation, investors breathed easy as the company shared a positive outlook in its earnings report. 

    By Aug. 21, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Cyber authorities have a plan to defend remote monitoring tools

    Threat actors can turn one point of attack into many by targeting remote management services that lack security controls.

    By Aug. 18, 2023
  • Wall Street sign in the financial district of New York City.
    Image attribution tooltip
    JaysonPhotography via Getty Images
    Image attribution tooltip

    Palo Alto Networks closely watched ahead of late Friday Q4 report

    The cybersecurity firm's unusually timed fiscal fourth-quarter earnings report comes amid turbulence in the sector.

    By Aug. 18, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Suncor CEO says company mostly recovered from June cyberattack

    The incident was serious and not worth repeating, President and CEO Rich Kruger said. "I’d rather have a root canal than go through one of these attacks again.”

    By Aug. 17, 2023
  • Person pushing large stone uphill
    Image attribution tooltip
    Nastco via Getty Images
    Image attribution tooltip

    Security basics aren’t so basic — they’re hard

    Lax security controls cause heavy damages, and security experts warn how unmet basics turn up, time and again, when things go wrong.

    By Aug. 17, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, AWS’ Mark Ryland told Cybersecurity Dive.

    By Aug. 16, 2023
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    How disjoined threat intelligence limits companies — and what to do about it

    There’s no shortage of research on attackers, but for many CISOs, turning those insights into action is a difficult endeavor.

    By Aug. 15, 2023
  • Acting National Cyber Director Kemba Walden speaking at Black Hat 2023.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Why Walden thinks this national cybersecurity strategy will work

    The acting national cyber director, armed with more talent at the federal level and an implementation plan, is striving for lasting impact.

    By Aug. 11, 2023
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    White House wants input on open source security, memory-safe languages

    Federal agencies put out a request for information Thursday, building on Biden administration priorities to help secure open source post-Log4j.

    By Aug. 11, 2023
  • three adults stand on a stage in front of a yellow curtain. One adult is standing at a podium and speaking.
    Image attribution tooltip
    Kara Arundel/Cybersecurity Dive, data from White House
    Image attribution tooltip

    3 best practices from the White House K-12 cybersecurity summit

    School leaders must take prevention seriously and know who to call when an attack happens, government officials and educators said.

    By Kara Arundel • Aug. 11, 2023
  • Woman speaking on stage in front of a purple curtain in a black blazer and sparkly pants. There is also a podium that says "Black Hat USA 2023."
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    4 ways organizations can take back the advantage from attackers

    By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023. 

    By Aug. 10, 2023
  • Woman in a black suit stands behind a podium with a sign that reads "enhancing cybersecurity protecting New Yorkers."
    Image attribution tooltip
    Courtesy of Darren McGee/ Office of Governor Kathy Hochul
    Image attribution tooltip

    New York rolls out statewide cybersecurity strategy

    The strategy follows previous steps to enhance local cybersecurity and protect critical infrastructure across the state.

    By Aug. 10, 2023
  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Rapid7 to cut 18% of workforce, shutter certain offices

    The cybersecurity firm had been the subject of speculation about pursuing a possible sale.

    By Aug. 9, 2023
  • The United States Capitol Building seen at a distance.
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    NIST releases draft overhaul of its core cybersecurity framework

    It marks the first major update to federal risk guidance since 2014 and incorporates new issues, including supply chain security and threats to small business.

    By Aug. 9, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Aug. 9, 2023
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurer Resilience raises $100M in expansion bid

    The company plans to use the funding to assist the global expansion and scale the adoption of its recently launched cyber-risk platform.

    By Alexei Alexis • Aug. 8, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS pledges $20M to K-12 cyber training, incident response

    The cloud services provider is participating in a broad White House plan to build additional protection to defend schools against ransomware and other threats.

    By Aug. 7, 2023
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA seeks to address visibility, resilience in 3-year strategic plan

    The agency outlined a major push to recognize and respond to immediate cyberthreats and make secure development practices a priority.

    By Aug. 7, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Inside the most-commonly exploited CVEs of 2022

    Delayed patching and unmet secure-by-design principles are aggravating the risk of compromise, the Five Eyes warned Thursday.

    By Aug. 4, 2023