Strategy: Page 8


  • Female Developer Thinking and Typing on Computer, Surrounded by Big Screens Showing Coding Language
    Image attribution tooltip

    shutterstock.com/Gorodenkoff

    Image attribution tooltip
    Sponsored by Synopsys

    5 considerations for securing your software supply chain

    Do you know what’s in your code? These five considerations should help you drive your security activities and identify weak points in your software supply chain.

    By Mike McGuire, Sr. Software Solution Manager, Synopsys • May 6, 2024
  • Industrial Engineer working and control robotics with monitoring system software and icon industry network connection on tablet
    Image attribution tooltip
    ipopba via Getty Images
    Image attribution tooltip
    Sponsored by Indiana University

    How can AI companies navigate a complex regulatory framework? — Compliance Labels

    The rapid unregulated growth in the field of artificial Intelligence has given rise to Large Language Models (LLM’s) such as GPT-4 and Gemini which has contributed to major technical advancements but has also been coupled with legal and ethical issues.

    By Sai Prasad, Security Analyst, CyberProof, MS Cybersecurity Risk Management '22 • May 6, 2024
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Azure OpenAI confidentiality loophole
    Image attribution tooltip
    jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft restructures security governance, aligning deputy CISOs and engineering teams

    The company will enhance management roles under the CISO and partially tie compensation to security performance.

    By May 3, 2024
  • Bottles of Clorox bleach on a supermarket shelf.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Clorox lowers sales outlook as recovery from 2023 cyberattack continues

    The cleaning products maker is still working to fully restore distribution capabilities after the attack.

    By May 3, 2024
  • Andy Jassy, Amazon President & CEO attends the Los Angeles Premiere of Amazon Prime Video's "The Lord Of The Rings: The Rings Of Power" at The Culver Studios on August 15, 2022 in Culver City, Califor
    Image attribution tooltip
    Kevin Winter / Staff via Getty Images
    Image attribution tooltip

    Amazon CEO touts AWS cloud security as AI risk concerns mount

    Andy Jassy urged enterprises “not to overlook the security and operational performance” of cloud-based generative AI services. “It’s less sexy, but critically important.”

    By Matt Ashare • May 3, 2024
  • CEO Satya Nadella of Microsoft pictured on stage with the Microsoft logo in the background.
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip
    Deep Dive

    At Microsoft, years of security debt come crashing down

    Critics say negligence, misguided investments and hubris have left the enterprise giant on its back foot.

    By April 30, 2024
  • Shot of a programmer looking stressed out while working on a computer code at night.
    Image attribution tooltip

    shutterstock.com/PeopleImages.com - Yuri A

    Image attribution tooltip
    Sponsored by Synopsys

    What to do when your team is struggling to manage too many application security vendors

    A good ASPM solution will correlate and analyze data from a variety of sources, allow you to administer and orchestrate security tools, and automate your security policies.

    April 29, 2024
  • Microsoft CEO Satya Nadella addresses shareholders during Microsoft Shareholders Meeting December 3, 2014 in Bellevue, Washington.
    Image attribution tooltip
    Stephen Brashear / Stringer via Getty Images
    Image attribution tooltip

    Microsoft CEO says security is its No. 1 priority

    The comments from Satya Nadella come weeks after a withering report from the federal Cyber Safety Review Board scrutinized how the company prioritized speed to market over security.

    By April 26, 2024
  • Abstract black and white monochrome art with surreal funnel.
    Image attribution tooltip
    Philipp Tur/Getty Images Plus via Getty Images
    Image attribution tooltip

    What is success in cybersecurity? Failing less.

    Defenders aren’t measured by pure wins or losses. Intrusions will happen, and their job is to keep a bad situation from getting worse.

    By April 26, 2024
  • CISA Director Jen Easterly, RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CISA director pushes for vendor accountability and less emphasis on victims’ errors

    Stakeholders need to address why vendors are delivering products with common vulnerabilities, which account for the majority of attacks, Jen Easterly said.

    By April 25, 2024
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Enterprises are getting better at detecting security incidents

    Google Cloud’s Mandiant saw significant improvements in how organizations track down threats, yet hackers are still abusing common threat vectors.

    By April 23, 2024
  • Computer keyboard with key marked "insurance."
    Image attribution tooltip
    sodafish via Getty Images
    Image attribution tooltip

    Cyber insurance gaps stick firms with millions in uncovered losses

    A CYE analysis of 101 breaches across various sectors revealed insurance gaps resulting in an average of $27.3 million in uncovered losses per incident.

    By Alexei Alexis • April 22, 2024
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip

    Majority of businesses worldwide are implementing zero trust, Gartner finds

    Programs are typically sponsored by C-suite executives, while the CISO is often tasked with execution, according to Gartner.

    By April 22, 2024
  • A close up of a cursor arrow hovering over an X on a screen, pixelated with red, blue and green colors.
    Image attribution tooltip
    ar-chi via Getty Images
    Image attribution tooltip
    Opinion

    The art of threat modeling: 3 frameworks to know

    Organizations should use the frameworks in a manual or automated way to better understand the security threats they’re up against, Gartner’s William Dupre writes. 

    By William Dupre • Updated April 24, 2024
  • In this photo illustration, the welcome screen for the OpenAI "ChatGPT" app is displayed on a laptop screen on February 03, 2023 in London, England. OpenAI,
    Image attribution tooltip
    Leon Neal / Staff via Getty Images
    Image attribution tooltip

    ChatGPT grabs the shadow IT crown: report

    Generative AI tools emerged as the latest villain in the enterprise battle to curb SaaS bloat and rationalize software portfolios, Productiv analysis found.

    By Matt Ashare • April 16, 2024
  • Ransomware virus has encrypted data. Attacker is offering key to unlock encrypted data for money.
    Image attribution tooltip
    vchal via Getty Images
    Image attribution tooltip

    Top officials again push back on ransom payment ban

    In lieu of a ban, the Institute for Security and Technology advises governments to achieve 16 milestones, most of which are already in place or in the works.

    By April 15, 2024
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISA to big tech: After XZ Utils, open source needs your support

    The attempted malicious backdoor may have been part of a wider campaign using social engineering techniques, the open source community warned.

    By April 15, 2024
  • Hacker in Work. High Speed Computer Keyboard Typing by Professional Hacker.
    Image attribution tooltip

    shutterstock.com/Virrage Images

    Image attribution tooltip
    Sponsored by Synopsys

    DevSecOps, done right, can achieve both speed and security in software development

    You don’t have to choose between speed or security if you do DevSecOps correctly. Learn how.

    April 15, 2024
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CISO role shows significant gains amid corporate recognition of cyber risk

    A report from Moody’s Ratings shows CISOs and other senior-level cyber executives have become key decision makers within the C-suite. 

    By April 9, 2024
  • Oil Or Gas Transportation With Blue Gas Or Pipe Line Valves On Soil And Sunrise Background
    Image attribution tooltip
    onurdongel via Getty Images
    Image attribution tooltip

    Industry stakeholders seek 30-day delay for CIRCIA comments deadline

    Industry officials are asking for additional time to comb through hundreds of pages of detailed rules about disclosure of covered cyber incidents and ransom payments.

    By April 8, 2024
  • Rendered graphics with laptop, hand and dumbbell.
    Image attribution tooltip
    Permission granted by Fortinet
    Image attribution tooltip
    Sponsored by Fortinet

    The top 5 SecOps strategies to strengthen business in 2024

    Learn the importance of specialized security fueled by artificial intelligence and machine learning, why comprehensive coverage from attacks is critical and how to embrace new methods of supporting your IT teams.

    April 8, 2024
  • Dollars flowing through the tunnel with binary code texture.
    Image attribution tooltip
    adventtr via Getty Images
    Image attribution tooltip

    Cybersecurity venture funding remains weak, near three-year low

    Quarterly funding levels hit $2.3 billion in Q1 2024, a far cry from the $8 billion high the market achieved in the final quarter of 2021, according to Pinpoint Search Group.

    By April 5, 2024
  • A row big buildings with small shop storefronts underneath.
    Image attribution tooltip
    Mshake via Getty Images
    Image attribution tooltip

    What’s missing for SMBs? A solid cybersecurity culture

    Small businesses can be especially vulnerable to cyberattacks because of their limited resources, and few have employees on staff who truly understand the value of secure business operations.

    By Sue Poremba • April 1, 2024
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    Water woes: A federal push for cyber mitigation is highlighting the sector’s fault lines

    The water utility industry says they recognize the heightened threat environment, but the current federal push fails to account for their resource constraints.

    By March 28, 2024
  • Amtrak Coast Starlight Train
    Image attribution tooltip
    Laser1987 via Getty Images
    Image attribution tooltip

    CISA issues notice for long-awaited critical infrastructure reporting requirements

    CIRCIA will require covered entities to promptly disclose major cyber incidents and ransomware payments.

    By March 27, 2024