Strategy: Page 24


  • Xe-100 reactor
    Image attribution tooltip
    Courtesy of X-energy
    Image attribution tooltip

    Cyber insurance premiums soar for energy companies

    Global politics and ransomware are driving insurance cost increases, more than doubling rates for some independent power producers. 

    By Robert Walton • Feb. 18, 2022
  • Close up stock photograph of a mature man working with a large computer screen. Heā€™s working with 3D software examining complicated shapes.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    Cybersecurity outlook for 2022

    Nation-state cyberthreats and Log4j have the security community on high alert; organizations need to master response and remediation.  

    By Feb. 14, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineāž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Kevin Mandia, CEO, Mandiant, keynote during the Mandiant Cyber Defense Summit 2021
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    Mandiant stock jumps on takeover report as incident responder swings to Q4 profit

    After divesting FireEye Products, Mandiant has a streamlined portfolio, but expansion will be expensive. 

    By Feb. 9, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    Security strategies evolve while spending flatlines

    Organizations want more bang for their buck, which can mean eschewing single-use products. 

    By Brian Eastwood • Feb. 8, 2022
  • Image attribution tooltip

    iStock/Guirong Hao

    Image attribution tooltip
    Sponsored by Keeper Security

    Smart cybersecurity budgeting in the age of ransomware

    Cut through the noise and learn how organizations can optimize their cybersecurity spend.

    Feb. 7, 2022
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Cybersecurity tool trends to watch in 2022

    For enterprises, the security priority remains doing more with less and finding tools that offer greater areas of coverage and integration.

    By Sue Poremba • Jan. 27, 2022
  • Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Biden gives defense, intel agencies 180 days to apply MFA, encryption

    The White House's memorandum builds on past requirements to bolster U.S. cyber standards. This time, the administration is targeting agencies that handle classified intelligence. 

    By Samantha Schwartz • Jan. 20, 2022
  • Hands type on a laptop keyboard, screen shows a software editor
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Extracting portions of open source in software development threatens app security

    While companies employ safeguards to detect flaws in applications, the likelihood of organizations running a complete database of all the places a vulnerability lives is slim.

    By Samantha Schwartz • Jan. 19, 2022
  • Communication network concept. GUI (Graphical User Interface).
    Image attribution tooltip
    metamorworks via Getty Images
    Image attribution tooltip

    Can SOAR technology help SOCs regain the advantage in threat detection?

    Google's acquisition of Siemplify has placed a focus on whether automation can help restore balance in the fight against sophisticated attackers.

    By Jan. 7, 2022
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Congressional cyber commission expires but work to continue with 'Solarium 2.0'

    Despite the commission's success, unfinished business includes setting up a joint collaborative environment, institutionalizing the Cyber Diplomacy Act, creating a bureau of cyber statistics, and codifying critical infrastructure.

    By Samantha Schwartz • Dec. 23, 2021
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Security teams prepare for the yearslong threat Log4j poses

    Industry is still investigating the full extent of the vulnerability, which limits the actions security teams can immediately take. 

    By Samantha Schwartz • Dec. 16, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    Long-expected cyber incident reporting rule loses ground once again

    The House's recently passed National Defense Authorization Act is set to advance to the Senate. But it omitted a key cyber rule: mandatory incident reporting. 

    By Samantha Schwartz • Dec. 10, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    What incident reporting could look like

    Legislation could remove some of the complexity of overlapping standards when CISA's roles and authorities become more robust. 

    By Samantha Schwartz • Dec. 10, 2021
  • Image attribution tooltip
    Luke Sharrett via Getty Images
    Image attribution tooltip

    TSA rolls out rail cyber requirements, targeting prevention and rapid response

    The directives, with immediate implementation expected, are primarily for higher-risk freight railroads, passenger rail, and rail transit, DHS said. 

    By Samantha Schwartz • Dec. 3, 2021
  • Image attribution tooltip
    Dan Kitwood via Getty Images
    Image attribution tooltip

    Crypto becoming the preferred currency of cybercriminals and rogue governments

    Authorities are turning the tables on cybercriminals by tracing the steps of illicit transactions and making it more difficult for ransomware operators to evade detection.

    By Nov. 24, 2021
  • Software building
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    What to consider when connecting cyber, business strategy

    The common issue security and business leaders run into is miscommunication, Gartner's Jeffrey Wheatman said.

    By Samantha Schwartz • Nov. 17, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Banks outpace other industries in cyber investments, defense strategies: report

    The banking industry is actively investing in cyber defense and employing sound corporate governance practices to combat threats, Moody's found.

    By Nov. 15, 2021
  • A person holds a credit card in front of a laptop computer.
    Image attribution tooltip
    Poike via Getty Images
    Image attribution tooltip

    Trust is becoming a CISO priority, boosts customer stickiness

    Customers are more likely to forgive a particular brand for putting data at risk if they trust the company, Forrester research shows.

    By Nov. 10, 2021
  • Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    ICS security investments blocked by management confusion

    Until cyber risks in operational technology are better understood — and IT and OT can overcome cultural differences — companies can stall additional investments.  

    By Samantha Schwartz • Nov. 10, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA wants to identify the most vulnerable critical infrastructure

    The agency is basing its analysis on economic and network centrality, as well as "logical dominance in the national critical functions," Director Jen Easterly said.

    By Samantha Schwartz • Nov. 1, 2021
  • A building wall engraved with the words Wall Street.
    Image attribution tooltip
    Spencer Platt via Getty Images
    Image attribution tooltip

    Corporate boards, C-suite finally prioritize cyber after years of business risk

    Following a surge of supply chain attacks and ransomware over the past year, enterprise leaders are finally giving cybersecurity the attention it deserves.

    By Oct. 27, 2021
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip
    Q&A

    A conversation with SolarWindsā€™ CISO

    "Our CEO got a call in the morning from Kevin Mandia. And then he called me, and then the CTO for FireEye called me. That's our nightmare moment," Tim Brown told Cybersecurity Dive. 

    By Samantha Schwartz • Oct. 26, 2021
  • A woman sitting by her laptop with a clothes rack in the background. SHe is behind a mirror wall.
    Image attribution tooltip

    stock.adobe.com/JacobLund

    Image attribution tooltip
    Sponsored by Cybersource

    How businesses are tackling fraud in a digital-first reality

    With digital transactions and eCommerce continuing to grow in volume, successfully taking on fraud will require businesses to explore and rely on new tools and technologies.

    Oct. 25, 2021
  • Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    2022 could bring OT weaponization, ransomware laws, Gartner says

    In the last decade companies underwent digital transformation, with cloud taking over legacy solutions. But the same practices cannot be deployed year after year.

    By Samantha Schwartz • Oct. 21, 2021
  • Avoid paying ransoms, Gartner says. Instead, focus on situational awareness

    In the event of a ransomware attack, CISOs need to pause amid chaos and gain a better understand around steps to recovery. 

    By Samantha Schwartz • Oct. 20, 2021