Strategy: Page 21


  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    US government rejects ransom payment ban to spur disclosure

    Federal authorities strongly discourage organizations from paying ransoms, but Anne Neuberger of the National Security Council explains why it decided against a ban.

    By Sept. 19, 2022
  • Industrial equipment (pipes, manometer/pressure gauge, levers, faucets, indicators) in a natural gas compressor station.
    Image attribution tooltip
    Cat Eye Perspective via Getty Images
    Image attribution tooltip

    Industrial control systems face more cyber risks than IT, expert testifies

    Most ICS technology was designed more than 20 years ago and built without cyber resilience, Idaho National Laboratory's Vergle Gipson said. 

    By Sept. 16, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Microsoft cloud security exec challenges organizations to ditch outdated practices

    Modern systems and modes of attack demand a dynamic and realistic security strategy, Shawn Bice said. The problem can be managed, not solved.

    By Sept. 16, 2022
  • A stack of $20 U.S. bills lay on top of a scattering of more $20 bills.
    Image attribution tooltip
    Maksym Kapliuk via Getty Images
    Image attribution tooltip

    State education leaders prioritize cybersecurity, but lack funding

    In a survey by the State Educational Technology Directors Association, 57% of respondents said their state provides a low amount of funding for cybersecurity.

    By Anna Merod • Sept. 15, 2022
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Security vendor consolidation a priority for majority of organizations worldwide

    Gartner research shows a surge in organizations that want to reduce the complexity of their security stacks.

    By Sept. 14, 2022
  • Sen. Angus King was part of a panel with Suzanne Spaulding and Mike Montgomery at the Billington CyberSecurity Summit in Washington D.C.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    US is shoring up gaps in cyber policy, but critical goals remain unfulfilled

    Legislators say the Cyberspace Solarium Commission led to significant national security enhancements, but analysts are calling for urgent momentum on a federal law on data privacy and security.

    By Sept. 13, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google closes $5.4B Mandiant acquisition

    The Mandiant buy marks the second most expensive acquisition in Google’s history, underscoring the cloud provider’s commitment to become a standalone security brand.

    By Sept. 12, 2022
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA announces RFI for critical infrastructure cyber reporting mandate

    The agency plans to publish the information request in the Federal Register on Monday and will kick off a national listening tour.

    By Sept. 9, 2022
  • Two people sitting on a stage during a conference, with a U.S. flag in the background.
    Image attribution tooltip
    Permission granted by Billington CyberSecurity
    Image attribution tooltip

    CISA Director: Tech industry should infuse security at product design stage

    Agency director Jen Easterly outlined a push for faster incident reporting and closer industry collaboration.

    By Sept. 7, 2022
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Most organizations remain unprepared for ransomware attacks

    Too many organizations are failing to meet cybersecurity demands. Ransomware attacks abound and humans are still the weakest link.

    By Sept. 6, 2022
  • An octopus floats, depicted in a deep blue background
    Image attribution tooltip
    TheSP4N1SH via Getty Images
    Image attribution tooltip

    Okta CEO pushes for passwordless future in wake of phishing attacks

    Customers that rely on passwords and log-in pages are putting their organizations at greater risk of attack, Todd McKinnon told analysts.

    By Sept. 2, 2022
  • Stock Market trading charts on display.
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    CrowdStrike, Palo Alto earnings show resilience in cyber investments amid macro concerns

    Enterprises are continuing to invest in cybersecurity, but remain focused on consolidating vendors.

    By Sept. 1, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    SaaS sprawl amps up security challenges amid heightened risk

    Two-thirds of businesses say they're spending more on SaaS applications year over year, Axonius data shows.

    By Roberto Torres • Sept. 1, 2022
  • A fingerprint is scanned to prevent identity theft.
    Image attribution tooltip
    Ian Waldie via Getty Images
    Image attribution tooltip

    Multifactor authentication has its limits, but don’t blame the technology

    Despite phishing attacks that evaded authentication and engulfed many technology companies of late, organizations shouldn’t hesitate to use MFA.

    By Sept. 1, 2022
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISOs aim to balance investments, outsourcing against risks

    Cyberattack risk still largely comes down to human error, regardless of how much organizations spend to bolster defense.

    By Aug. 31, 2022
  • A screen with the Slack logo on the trading floor of the New York Stock Exchange.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Slack enhances platform security amid rapid expansion and heightened risk

    The enterprise messaging platform has faced increased customer concerns about security and privacy.

    By Aug. 31, 2022
  • Lloyd's employee at company headquarters
    Image attribution tooltip
    Matt Cardy via Getty Images
    Image attribution tooltip

    Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil

    Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable. 

    By Aug. 29, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Tips for how to safeguard against third-party attacks

    Organizations need to demand and ensure all vendors implement rigorous security measures. Sometimes the least likely tools pose the most risk. 

    By Aug. 25, 2022
  • A trader sits at a computer in front of a wall of screens displaying stock informations at the New York Stock Exchange.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Cybersecurity spending strategies in uncertain economic times

    The need for strong cybersecurity programs doesn’t make it immune to cuts.

    By Sue Poremba • Aug. 25, 2022
  • Blue padlock made to resemble a circuit board and placed on binary computer code.
    Image attribution tooltip
    matejmo via Getty Images
    Image attribution tooltip

    Risk of cyberattack emerges as top concern of US executives

    A PwC study shows cyber risk is a top concern among entire C-suite and corporate boards as companies are spending additional funds to boost resilience.

    By Aug. 19, 2022
  • Google Cloud VP and CISO Phil Venables
    Image attribution tooltip
    Permission granted by Google
    Image attribution tooltip

    Google Cloud’s CISO is a short-term cyber pessimist, but a long-term optimist

    Respite from seemingly omnipresent threats is hard to come by, but Phil Venables takes comfort in wins, not losses.

    By Aug. 18, 2022
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp breach shines new light on digital identity, supply chain risk

    Sophisticated threat actors are targeting weak links in the email marketing space to go after vulnerable financial targets.

    By Aug. 18, 2022
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    DigitalOcean, caught in Mailchimp security incident, drops email vendor

    An attack on the email marketing firm raises questions about the continued risk of a supply chain compromise. 

    By Aug. 17, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Zero trust adoption skyrockets, nearing universal adoption

    A report from Okta shows organizations fully embracing zero-trust principles, as hybrid work requires long-term changes to identity management. 

    By Aug. 16, 2022
  • Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency, testifies on Capitol Hill, October 19, 2017 in Washington, DC.
    Image attribution tooltip
    Drew Angerer/Getty Images via Getty Images
    Image attribution tooltip

    Don’t count on government, tech vendors to fix security woes, former CISA chief Krebs says

    The state of cybersecurity is bad and it’s going to get worse, Chris Krebs said at Black Hat. But somehow things might eventually get better.

    By Aug. 10, 2022