Strategy: Page 25


  • An aerial view on a sunny morning of several of San Francisco's most well known architectural landmarks. A backdrop of the skyscrapers and Bay Bridge behind them.
    Image attribution tooltip
    DianeBentleyRaymond via Getty Images
    Image attribution tooltip

    5 takeaways from the RSA Conference

    The event tried to pick up where it left off 28 months ago. Can defenders keep up with the accelerated pace and scale of the cyber threat?

    By June 13, 2022
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    America's cyber chiefs have a long to-do list

    The federal government wants to lead by example and communicate the urgency of the moment. First, it needs to get its security affairs in order. 

    By June 9, 2022
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Kenny Holston via Getty Images
    Image attribution tooltip

    Threat hunters minimize Russia's cyber prowess

    U.S. organizations have a lot to learn from Ukrainian cyber defenders’ sophisticated resiliency during hostile conditions.

    By June 9, 2022
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    Organizational changes required to mitigate security risks

    Executives are implementing new strategies to lower software supply chain risk, but evaluating internal operations could prove more effective.

    By Lindsey Wilkinson • June 7, 2022
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Oil and gas industry pledges cyber cooperation at World Economic Forum

    Energy companies and industrial cybersecurity firms are working collaboratively to protect critical infrastructure in an evolving threat environment.

    By May 26, 2022
  • Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Feds remain in the dark as ransomware disclosure lags

    The government's lack of ransomware data makes it more difficult to prevent, mitigate and recover from attacks, said Sen. Gary Peters, D-MI.

    By May 25, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Google Cloud positions itself as a 'standalone security brand'

    The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture.

    By May 24, 2022
  • Lucia Milică Stacy, global resident CISO at Proofpoint
    Image attribution tooltip
    Permission granted by Proofpoint
    Image attribution tooltip

    CISOs say they're at less risk of a substantial cyberattack

    A modest confidence boost and more deliberate security strategies follow two years of pandemic-induced chaos, a Proofpoint-sponsored survey found.

    By May 17, 2022
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Microsoft, Apple and Google double down on FIDO passwordless standard

    The move is designed to boost digital security by allowing users to quickly authenticate across multiple devices and platforms. 

    By May 5, 2022
  • A picture of the street sign stating "Wall Street." American flags drape over a nearby building
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip

    M&A sets record pace as ransomware, nation-state threats fuel security demand

    Enterprise customers seek consolidated, end-to-end platforms to anticipate, detect and eliminate threats. 

    By April 29, 2022
  • A stock image of a calculator alongside financial numbers
    Image attribution tooltip
    atiatiati via Getty Images
    Image attribution tooltip

    What cyber insurance companies want from clients

    Insurers evaluate how a company leverages technology and what internal standards are in place to manage risk.

    By Sue Poremba • April 28, 2022
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Ransomware attacks, payouts soared worldwide in 2021: report

    More organizations are paying ransoms as attacks grow in sophistication.

    By April 27, 2022
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies.

    By Brian Eastwood • April 25, 2022
  • A woman looking at her laptop holding a payment card.
    Image attribution tooltip
    Permission granted by Cybersource
    Image attribution tooltip
    Sponsored by Cybersource/Visa

    Merchants prioritize fraud prevention as fraud costs, impact to businesses rise

    Merchants are grappling with which tools to use, which are most effective and how to balance rising fraud attacks on a limited budget without hampering CX.   

    April 25, 2022
  • A password field reflected on a eye.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Behind the push to finally eliminate passwords

    The FIDO Alliance is pushing for smartphones to become the authentication standard as the tech industry presses for new methods. 

    By Lance Whitney • April 20, 2022
  • Image attribution tooltip
    marchmeena29 via Getty Images
    Image attribution tooltip
    Sponsored by Hyperproof

    How to advocate for your security, compliance and risk management program

    Feel like your compliance and security team could be better supported? Follow these five best practices to ensure your team gets the resources they need from leadership.

    April 18, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images
    Image attribution tooltip

    2 years later: What's next in security for the pandemic-era workforce

    Organizations can expect the return-to-work model to stress a corporate infrastructure that has languished in recent years. 

    By Sue Poremba • April 13, 2022
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Datto, SailPoint acquired for more than $6B each amid growing cyber consolidation

    Buyers Kaseya and Thoma Bravo join the feeding frenzy a month after Google’s $5.4 billion deal to buy Mandiant.

    By April 11, 2022
  • Rear view personal perspective of diverse executive team video conferencing with male CEO and discussing data.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip
    Opinion

    Midsize enterprises: Strengthen security for today's threat landscape

    Midsize enterprises must protect against the same security threats as larger organizations, but with smaller budgets and fewer IT resources.

    By Paul Furtado • April 4, 2022
  • The Kronos outage disrupted one employer's payroll for more than a month. Here's how it moved forward.

    UMass Memorial Health had to quickly improvise to run payroll for more than 16,000 employees without hours-worked data, CFO Sergio Melgar said. 

    By Ryan Golden • March 24, 2022
  • A lit Microsoft log seen above a group of people in shadow.
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft rolls out security red carpet for competitors' cloud customers

    With a cloud-agnostic security tool in hand, Microsoft is vying to support customers' multicloud strategies. 

    By Barbara DeLollis • March 23, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images
    Image attribution tooltip

    Cyberthreats grow as US, NATO countries press Russia sanctions

    The FBI and CISA warned of potential new threats against satellite communications providers.

    By March 18, 2022
  • Company signage outside Google's offices in Germany
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Dinner is served: Cyber M&A feeding frenzy shows hunger for trust

    Google's $5.4 billion bid for Mandiant was just one of 200-plus cybersecurity deals last year.

    By Naomi Eide • March 17, 2022
  • Server room (Sefa Ozel/Getty)
    Image attribution tooltip
    Sefa Ozel/Getty via Getty Images
    Image attribution tooltip

    CrowdStrike shares surge on strong Q4 earnings and robust annual forecast

    The cybersecurity firm reported a blockbuster Q4 a day after rival Mandiant was acquired by Google.  

    By March 10, 2022
  • Google logo displayed outside the company's New York City office.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Google swoops in to buy Mandiant for $5.4B after weeks of market speculation

    The deal follows reported negotiations between Microsoft and the incident response specialist, which sold off its FireEye products business last year.

    By Updated March 8, 2022