Strategy: Page 27


  • Image attribution tooltip
    Courtesy of Apple
    Image attribution tooltip

    Apple's privacy, security features seen as favorable to enterprise remote work

    Experts are comparing Private Relay to protections traditionally found in VPN technology, as Apple continues to grow its enterprise presence. 

    By June 8, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Data breaches, poor cyber practices raise cost of borrowing: study

    Research from the American Accounting Association shows banks have raised interest rates on companies where customer data has been hacked.

    By June 7, 2021
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineāž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Image attribution tooltip
    Rob Kim via Getty Images
    Image attribution tooltip

    CISOs earn higher profile with remote work, evolving threats

    Corporate boards are demanding regular updates on the latest threats, while simultaneously asking CISOs to make sure workers meet business objectives in the most secure manner possible.

    By June 3, 2021
  • Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip
    White House cyber strategy takes shape

    Biden budget proposes $58B to take on legacy tech, cybersecurity

    Legacy tech holds the federal government back, and agencies remain targets of advanced cyber crime. The budget proposal provides financial support to chip away at recovery.

    By June 3, 2021
  • Man studying on a computer
    Image attribution tooltip
    FluxFactory, E+ via Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    Rethink risk management programs post-SolarWinds, experts say

    Companies need to ensure their vendors are putting the most protections in place for their most important products and services. 

    By Samantha Schwartz • June 1, 2021
  • Sponsored
    Image attribution tooltip
    Permission granted by Axonius
    Image attribution tooltip
    Sponsored by Axonius

    The pandemic's impact on IT complexity, security priorities

    A survey of IT security pros shed light on the pandemic’s impact on IT complexity & security trends.

    By Mekhala Roy, Axonius • June 1, 2021
  • Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip
    Column

    Behind the Firewall: 4 cyber executives on security disasters they avoided

    Cybersecurity leaders dodge catastrophes each day — from malware to gaps in the network perimeter. 

    By , , Samantha Schwartz • May 28, 2021
  • Image attribution tooltip
    Adam Berry via Getty Images
    Image attribution tooltip

    Beware open source when going zero trust, expert says

    To combat software insecurities, begin with software inventory and a software bill of materials requirement.

    By Samantha Schwartz • May 25, 2021
  • Cyber premiums rise as insurers struggle to assess risk: GAO

    Not only are insurers increasing premiums, they are lowering coverage limits "for certain perils," or types of cyberattacks, according to the report.

    By Samantha Schwartz • May 24, 2021
  • Image attribution tooltip
    Matthew Horwood via Getty Images
    Image attribution tooltip

    How security and privacy can cultivate a relationship

    Security and privacy are interwoven and layered throughout a company, motivated toward the end goal of data protection. Successful organizations recognize the overlap — and capitalize on it.

    By Samantha Schwartz • May 20, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    What 5 security chiefs learned from COVID-19

    From vaccine development to barren grocery story shelves, CISOs speaking at RSA Conference 2021 discussed how they navigated security in a complex threat landscape.

    By Samantha Schwartz • May 19, 2021
  • Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Security spending to rise, buoyed by cloud: Gartner

    Cloud security was the "smallest, but fastest growing" market, according to the research firm. 

    By Samantha Schwartz • May 18, 2021
  • President Joe Biden participates in a conference phone call with governors affected by a snowstorm in the Midwest and southwest Tuesday, Feb. 16, 2021, in the Oval Office of the White House.
    Image attribution tooltip
    Retrieved from The White House.
    Image attribution tooltip
    White House cyber strategy takes shape

    White House cybersecurity order lands with a plea for private sector help

    Federal action alone is not enough, the White House said, though higher government standards could improve private sector security. 

    By Samantha Schwartz • May 13, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Collaboration breakdowns hurt security, transformation

    Companies that succeeded at pivoting to remote work, and managing the associated IT and cybersecurity challenges, were those that enabled cross-functional teams.

    By Roberto Torres • May 7, 2021
  • Robots assemble Ford vehicles at the Chicago Assembly Plant on June 24, 2019 in Chicago, Illinois.
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Targeted industrial control systems add cautionary flag to cyber defense strategies

    A Defend Forward strategy used in the IT space may not translate well in the OT environment, according to panelists at the Hack the Capitol conference. 

    By May 6, 2021
  • DHS, homeland security
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by spainter_vfx via Getty Images
    Image attribution tooltip

    DHS cybersecurity sprints focus on ransomware, hiring

    The agency intends to undergo "the most significant hiring initiative" in its history to defend against cyberattacks, said Secretary Alejandro Mayorkas.

    By Samantha Schwartz • May 6, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Cyberthreats dog the US supply chain, complicated by global competition

    As companies acquire components and services, they need mechanisms to ensure backdoors are not lurking in their systems, experts at the Hack the Capitol 2021 conference said.

    By May 5, 2021
  • Close up of a person typing on a laptop
    Image attribution tooltip
    SARINYAPINNGAM via Getty Images
    Image attribution tooltip

    Relationships between DevOps, security warm slowly

    Some hurdles stem from miscommunication, or balancing quick product releases with undesired security gaps, research from GitLab shows. 

    By Samantha Schwartz • May 5, 2021
  • Hands on a keyboard
    Image attribution tooltip
    skynesher/E+ via Getty Images
    Image attribution tooltip

    When bad actors target OT, risk is recalculated

    Digital transformation is shrinking the gap between IT and OT, and organizations are called to factor diverse systems into risk calculations.

    By Samantha Schwartz • May 4, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    XDR to succeed legacy technologies as emerging threats pressure security

    Older SIEM and SOAR technologies are losing ground in a more sophisticated threat landscape, Forrester research shows.

    By May 3, 2021
  • CISOs call for holistic enterprise approach to third-party security risk

    Companies need to consider operational resilience, and take a more focused approach in their evaluation processes.

    By April 21, 2021
  • Drug production area, Merck (KGaA) Darmstadt, Germany
    Image attribution tooltip
    Permission granted by Merck KGaA
    Image attribution tooltip

    Pfizer segmented IT/OT after a board-level security directive

    The pharma company's IT and engineering organizations formed a combined security program in 2018, responsible for technology analysis and inventory.

    By Samantha Schwartz • April 21, 2021
  • A woman working from home
    Image attribution tooltip
    damircudic via Getty Images
    Image attribution tooltip

    US companies plot return to office, raising questions on hybrid security

    Remote workers are migrating to the corporate workspace, opening up a set of security challenges for CISOs. 

    By April 19, 2021
  • Image attribution tooltip
    Depositphotos
    Image attribution tooltip

    How IT can support security in the event of a cyberattack

    CIOs and CISOs operate as separate jobs leading different departments, but with work that overlaps. Who leads what in the event of an attack can become muddled. 

    By Jen A. Miller • April 13, 2021