Strategy: Page 2


  • Google New York City Headquarters, Manhattan
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Google Cloud to mandate MFA for all users in 2025

    The policy change puts the three largest cloud providers — AWS, Microsoft Azure and Google Cloud — in position to have MFA mandates for some or all customers next year.

    By Nov. 6, 2024
  • security operations center
    Image attribution tooltip
    iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Cyberattacks hit 1 in 3 SMBs last year

    Cyber woes for SMBs are exacerbated by a lack of resources to enact advanced security measures, Microsoft Security said in a report.

    By Nov. 5, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Phone in hand with 'pay' button showing
    Image attribution tooltip
    Tero Vesalainen via Getty Images
    Image attribution tooltip

    AI increases fraud risk, fintechs say

    Financial firms monitor for fraud by looking for unusual activity, but an artificial intelligence model can be trained to transact like a real person.

    By Patrick Cooley • Nov. 5, 2024
  • National Cyber Director Harry Coker Jr. delivers keynote on the national cybersecurity strategy implementation plan on May 22, 2024 at the McCrary Institute at Auburn University in Washington D.C.
    Image attribution tooltip
    Permission granted by McCrary Institute
    Image attribution tooltip

    USDA, White House launch study to boost cyber resilience of rural water utilities

    A yearlong program with the National Rural Water Association will provide technical assistance to water utilities led by Vermont and Oregon officials.

    By Nov. 4, 2024
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Enterprise executives cite AI-assisted attacks as top emerging risk, Gartner finds

    The analyst firm’s survey underscores growing concern about potential, yet unrealized, scenarios involving AI’s potential role in attacks.

    By Nov. 4, 2024
  • Adult women in data center checking cables and whole network, server setup and programing mainframe through digital tablet.
    Image attribution tooltip
    tomazl via Getty Images
    Image attribution tooltip

    Executives worry over aging IT systems

    Despite ongoing modernization efforts, tech debt is still hindering mission-critical infrastructure, according to Kyndryl.

    By Matt Ashare • Nov. 1, 2024
  • A photo illustration of Kamala Harris and Donald Trump shoulder to shoulder facing away from each other. The background is a purple wave with a grid gradient.
    Image attribution tooltip

    Photo illustration: Industry Dive; Joe Readle/Getty Images; Brandon Bell/Getty Images

    Image attribution tooltip

    As presidential election looms, disparate approaches to cyber policy come into focus

    Government officials and security leaders are hoping the nation’s need for cyber resilience will stand on bipartisan cooperation and transcend partisan politics regardless of the election results. 

    By Oct. 31, 2024
  • A man and a woman shake hands in front of a desk that has flags from the U.S. and Ukraine. The people are in front of a blue background with CISA logos.
    Image attribution tooltip
    Retrieved from Jen Easterly/CISA.
    Image attribution tooltip

    CISA rolls out international strategic plan to bolster cyber cooperation

    The agency is looking to strengthen intel sharing with key cyber partners, raise security standards and ensure a more resilient global supply chain. 

    By Oct. 30, 2024
  • A large airplane marked with the Delta Air Lines logo at an airport terminal
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    Delta, CrowdStrike file dueling lawsuits as squabble continues

    The airline seeks to recover damages of more than $500 million in the aftermath of a disruptive IT outage in July. The software provider is looking to hold its liability to the terms of its service agreement.

    By Roberto Torres • Oct. 28, 2024
  • Microsoft CEO Satya Nadella addresses shareholders during Microsoft Shareholders Meeting December 3, 2014 in Bellevue, Washington.
    Image attribution tooltip
    Stephen Brashear / Stringer via Getty Images
    Image attribution tooltip

    Microsoft CEO asked board to cut pay in connection with security overhaul

    Yet, Satya Nadella's fiscal 2024 compensation far exceeded 2023 thanks to Microsoft's strong market performance. 

    By Oct. 25, 2024
  • Daryl Plummer, distinguished VP analyst at Gartner, presents top predictions for CIOs and end users for 2025 and beyond in Orlando, Florida.
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip

    4 ways AI could impact employees, workflows: Gartner

    Technology leaders can expect AI to continue to raise questions around workforce shifts, privacy procedures and security techniques.

    By Lindsey Wilkinson • Oct. 23, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip
    Opinion

    How to implement attack surface management

    ASM is a core component of exposure management that organizations can leverage to enhance vulnerability management. 

    By Steve Santos • Oct. 23, 2024
  • The seal of the Federal Communications Commission.
    Image attribution tooltip
    Mark Wilson / Getty Images via Getty Images
    Image attribution tooltip

    FCC expands cooperation with states on data security, privacy enforcement

    More states are working with the agency to investigate possible violations of consumer privacy and data security laws.

    By Oct. 22, 2024
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISOs are gaining influence among corporate leadership

    A Deloitte Global report shows CISOs are involved in a growing set of strategic decisions about digital transformation, cloud and other technology issues.

    By Oct. 21, 2024
  • Merger and acquisition business concept, join company on puzzle pieces, 3d rendering
    Image attribution tooltip
    nespix via Getty Images
    Image attribution tooltip

    Sophos to buy Secureworks in $859M push into XDR

    The deal follows a marketwide push for vendor consolidation and a growing interest in more end-to-end offerings from a single provider.

    By Oct. 21, 2024
  • Microsoft President and Vice Chair Brad Smith speaks April 12, 2023, at the Semafor World Economy Summit in Washington D.C.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Microsoft confirms partial loss of security log data on multiple platforms

    The company previously expanded free access to security logs on several platforms, including Purview, following the 2023 state-linked hack of Exchange Online.

    By Oct. 18, 2024
  • CISA Director Jen Easterly speaks at Carnegie Mellon University urging the tech industry to embrace secure-by-design product development.
    Image attribution tooltip
    Permission granted by Carnegie Mellon University
    Image attribution tooltip

    FBI, CISA seek input on software security, configuration changes

    Authorities are seeking public comment on steps the software industry can take to make their products more resistant to malicious threat activity.

    By Oct. 17, 2024
  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Majority of global CISOs want to split roles as regulatory burdens grow

    Trellix research shows rising cybersecurity demands from the SEC and other government bodies are pushing CISOs even closer to the edge.

    By Oct. 15, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    Where organizations invest after a data breach

    Asking customers to foot the bill for data breach remediation will not prevent future data breaches or address the issues that cause costs to increase.

    By Sue Poremba • Oct. 14, 2024
  • Tines story header image
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    Leading CISOs weigh in on AI’s role in security: 7 key takeaways

    Learn how CISOs are approaching AI adoption and embracing innovation -- while mitigating risk.

    By Thomas Kinsella, COO and co-founder • Oct. 14, 2024
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Decrease in deals and large rounds cut cyber funding to $2.1B in Q3

    The decline in funding accentuates the inconsistent pace of venture capital investments in cyber startups.

    By Oct. 10, 2024
  • A facade of the White House in Washington, D.C.
    Image attribution tooltip
    Nick van Bree via Getty Images
    Image attribution tooltip

    Cyber risk tops C-suite concerns heading into US election

    A report by PwC shows American business leaders will continue to focus on data regulation, AI and technology investments regardless of which party prevails in November.

    By Oct. 10, 2024
  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip
    Deep Dive

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

    By Lindsey Wilkinson • Oct. 9, 2024
  • Concept of technological development of innovation the use of computers in business
    Image attribution tooltip
    Natali_Mis via Getty Images
    Image attribution tooltip

    CISOs, C-suite remain at odds over corporate cyber resilience

    Security and IT executives, more than a year after a SEC vote on incident disclosure, still face an uphill battle to articulate risk strategy.

    By Oct. 7, 2024
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Counter Ransomware Initiative summit emphasizes arduous effort

    An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

    By Oct. 7, 2024