www.cybersecuritydive.com
Open in
urlscan Pro
2606:4700:4400::ac40:93a0
Public Scan
Submitted URL: https://link.cybersecuritydive.com/click/37753256.8986/aHR0cHM6Ly93d3cuY3liZXJzZWN1cml0eWRpdmUuY29tL3RvcGljL3N0cmF0ZWd5Lw/649073035...
Effective URL: https://www.cybersecuritydive.com/topic/strategy/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issue:%202024-12-06%20Cybersec...
Submission: On December 30 via api from AE — Scanned from FR
Effective URL: https://www.cybersecuritydive.com/topic/strategy/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issue:%202024-12-06%20Cybersec...
Submission: On December 30 via api from AE — Scanned from FR
Form analysis
6 forms found in the DOMName: signup-inter-form — POST /signup/
<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
<input type="hidden" name="signup_box_location" value="interstitial">
<input type="hidden" name="signup_initial_url_path" value="">
<h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
<p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
<p class="form-error__message" id="interstitial-error"></p>
<div id="form-interstitial">
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_9f34f3_email">
<div id="newsletter-list-section">
</div>
<div id="interstitial-consent-container">
<input name="user_consent" value="1" id="id_user_consent" type="checkbox">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>.
You can unsubscribe at anytime. </span>
</div>
</div>
<input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-desktop">
<span class="screen-reader-text search">Search</span>
</label>
<input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
<button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-drawer">
<img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
</button>
<img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_d09799_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_d09799_email">
</label>
<input type="hidden" name="signup_box_location" value="sidebar">
<input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
<input type="hidden" name="js_enabled" value="1" id="id_d09799_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
<label for="id_user_consent-sidebar">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_664a79_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_664a79_email">
</label>
<input type="hidden" name="signup_box_location" value="bottom">
<input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
<input type="hidden" name="js_enabled" value="1" id="id_664a79_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-bottom" value="1" class="checkbox">
<label for="id_user_consent-bottom">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
GET /search/
<form action="/search/" method="GET" data-ajax="false">
<label for="search-mobile">
<span class="screen-reader-text">Search</span>
<input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
</label>
<button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-mobile">
<img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
</button>
</form>
Name: signup — POST /signup/
<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
<label for="id_819689_email" class="email-input js-email-input">
<span class="screen-reader-text">Email:</span>
<input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_819689_email">
</label>
<input type="hidden" name="signup_box_location" value="integrated_menu">
<input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
<input type="hidden" name="js_enabled" value="1" id="id_819689_js_enabled">
<ul class="signup-list list-no-bullets">
<li>
<label><span class="screen-reader-text">Select user consent:</span></label>
<input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
<label for="id_user_consent-integrated_menu">
<span class="signup-user-consent_box">
<span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
<a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
</span>
</label>
</li>
</ul>
<button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
<script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
<label class="error email_error" style="display:none;">A valid email address is required.</label>
<label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>
Text Content
Skip to main content CONTINUE TO SITE ➞ DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. * Deep Dive * Library * Events * Press Releases * Topics Sign up * Search * Sign up Search * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation STRATEGY -------------------------------------------------------------------------------- * Vitalii Pasichnyk/Getty via Getty Images WHITE HOUSE SAYS 9TH TELECOM COMPANY HIT IN SALT TYPHOON SPREE A senior official blamed the intrusions on lax security and said in one case the compromise of a single administrator account led to access of over 100,000 routers. By Matt Kapko • Dec. 27, 2024 * Justin Sullivan/Getty Images via Getty Images CISA MOBILE SECURITY ADVICE GETS PERSONAL IN WAKE OF TELECOM INTRUSIONS The agency’s recommendations are not for the technically inept. Yet the extraordinary measures, including the use of encrypted apps, are applicable to all audiences. By Matt Kapko • Dec. 19, 2024 * Explore the Trendline➔ .shock via Getty Images Trendline RISK MANAGEMENT Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. By Cybersecurity Dive staff * Joe Cicak via Getty Images PENNSYLVANIA REPRESENTATIVE PITCHES BILL TO DOUBLE CYBER ASSISTANCE FOR LOCAL WATER SYSTEMS The proposed legislation comes amid a surge in ransomware and state-linked attacks against U.S. water utilities. By David Jones • Dec. 17, 2024 * Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images CISA’S PRE-RANSOMWARE ALERTS NEARLY DOUBLED IN 2024 The federal agency’s efforts to improve defenses surged in fiscal year 2024. Yet, attacks continue to climb. By Matt Kapko • Dec. 17, 2024 * * Adam Gray / Stringer via Getty Images EXECUTIVES SEE ANOTHER CROWDSTRIKE-LEVEL IT OUTAGE ON THE HORIZON IT and business leaders admit to prioritizing security at the expense of service disruption readiness, a PagerDuty report found. By Matt Ashare • Dec. 13, 2024 * Permission granted by Snowflake SNOWFLAKE TO PHASE OUT SINGLE-FACTOR AUTHENTICATION BY LATE 2025 The security policy change starts one year after a wave of attacks targeted more than 100 Snowflake customer environments without MFA. By Matt Kapko • Dec. 10, 2024 * iStock / Getty Images Plus via Getty Images CREDIT RISK RISING AS ATTACKERS STRIKE LARGER COMPANIES: MOODY’S Cybercriminals are deploying generative AI tools in their efforts at ransomware and fraud, Moody’s Ratings said. By Jim Tyson • Dec. 10, 2024 * Permission granted by Imprivata Sponsored by Imprivata FRONTLINE WORKFORCE TECH PREDICTIONS FOR 2025: A NEW ERA OF EFFICIENCY AND SECURITY 2025 Predictions: Boosting frontline efficiency with passwordless tech and identity and access management innovations By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Dec. 9, 2024 * * Adam Gray / Stringer via Getty Images FOR IT PROS, THE CROWDSTRIKE CRISIS WAS A ‘CALL TO ARMS’ The global outage triggered investments in people, processes and technologies to beef up enterprise resilience, Adaptavist research found. By Matt Ashare • Dec. 6, 2024 * luza studios via Getty Images Opinion PROTECTING THE CLOUD: COMBATING CREDENTIAL ABUSE AND MISCONFIGURATIONS To defend against two of today’s biggest cloud security threats, organizations must adapt and develop proactive strategies, Google Cloud’s Brian Roddy writes. By Brian Roddy • Dec. 5, 2024 * Anna Moneymaker/Getty Images via Getty Images Q&A T-MOBILE UNDETERRED AS TELECOM SECTOR REELS FROM ATTACK CAMPAIGN Cybersecurity Dive spoke with CSO Jeff Simon about how the carrier says it thwarted a threat group resembling Salt Typhoon despite its past security failures. By Matt Kapko • Dec. 5, 2024 * Alihan Usullu via Getty Images UK CYBER CHIEF WARNS COUNTRY IS AT AN INFLECTION POINT AS DIGITAL THREATS RISE In his first major speech, NCSC CEO Richard Horne said state linked and criminal threat groups are working to undermine the nation’s reliance on technology. By David Jones • Dec. 3, 2024 * * The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0 WHEN PASSWORD RULES CHANGE, WHO BENEFITS? As the National Institute of Standards and Technology rolls out updated password guidance, some experts want to make passwords a thing of the past. By Sue Poremba • Dec. 2, 2024 * stock photo via Getty Images FBI, CISA WARN OF HEIGHTENED RISK OF BEC ATTACKS DURING HOLIDAY SEASON Authorities encouraged prompt reporting, which can help recover stolen payments. By David Jones • Nov. 27, 2024 * Justin Sullivan via Getty Images CROWDSTRIKE AVOIDS CUSTOMER EXODUS AFTER TRIGGERING GLOBAL IT OUTAGE The cybersecurity vendor reported $33.9 million in expenses related to the July 19 incident, which caused the company to swing to a loss. By Matt Kapko • Nov. 27, 2024 * skynesher via Getty Images AS HOLIDAY SEASON BEGINS, US BRACES FOR LOOMING RISK OF CYBERATTACKS Security teams are on the alert for nation-state threats and ransomware as millions of workers break for a holiday. By David Jones • Nov. 26, 2024 * Retrieved from Cedar Sinai. HEALTHCARE PROVIDERS WILL NEED TO BOOST CYBER DEFENSES AMID AI ADOPTION: MOODY’S AI could ease labor shortages, but health systems will need to increase cybersecurity spending to manage heightened risks, according to the credit ratings agency. By Emily Olsen • Nov. 22, 2024 * Adam Gray via Getty Images MICROSOFT UNVEILS RESILIENCY, SECURITY ENHANCEMENTS FOLLOWING JULY GLOBAL IT OUTAGE The updates are part of a larger effort at the company to overhaul its internal security culture. By David Jones • Nov. 21, 2024 * Matt Kapko/Cybersecurity Dive PALO ALTO NETWORKS BOASTS AS CUSTOMERS COALESCE ON ITS PLATFORMS The cybersecurity vendor said it ended its fiscal Q1 with 1,100 platformization deals and remains on pace to reach at least 2,500 such deals within five years. By Matt Kapko • Nov. 21, 2024 * Christopher Furlong/Getty via Getty Images Opinion SECURITY AWARENESS AND TRAINING IS A METHOD, NOT AN OUTCOME In 2024, the idea of human risk management shifted from concept to reality as frustrated CISOs looked for solutions beyond security awareness and training to make real change. By Jinan Budge • Nov. 20, 2024 * Justin Sullivan via Getty Images SPLUNK ACCELERATES CISCO’S SECURITY BUSINESS AS CORE NETWORKING SALES DECLINE Security revenue doubled to $2 billion in Cisco’s recent quarter. Without Splunk’s contribution, its total revenue would have dropped 14%. By Matt Kapko • Nov. 18, 2024 * Permission granted by Office of the National Cyber Director NATIONAL CYBER DIRECTOR CALLS FOR STREAMLINED SECURITY REGULATIONS Harry Coker Jr. assured critical infrastructure and private sector stakeholders that while standards are necessary, there is a need to harmonize burdensome compliance demands. By David Jones • Nov. 14, 2024 * BNMK0819 via Getty Images Opinion WHO SHOULD BE IN THE ROOM WHEN PURCHASING CYBER INSURANCE? Cyber exposure should be treated just as seriously as a fire event, each with a high potential to disrupt business for extended periods of time, Peter Hedberg of Corvus Insurance writes. By Peter Hedberg • Nov. 11, 2024 * Bevan Goldswain via Getty Images Sponsored by University of New Hampshire EMPOWERING THE NEXT GENERATION OF CYBER LEADERS: MENTORING AND TALENT DEVELOPMENT INITIATIVES With guidance and support from mentorship programs and talent development initiatives, employees can become better equipped for success. Nov. 11, 2024 * Jack Taylor / Stringer via Getty Images TECH EXECUTIVES REASSESS IT RESILIENCE IN CROWDSTRIKE OUTAGE AFTERMATH Nearly all organizations have known operational weaknesses that leave IT systems vulnerable to service interruptions, according to Cockroach Labs. By Matt Ashare • Nov. 8, 2024 More stories GET THE FREE NEWSLETTER Subscribe to Cybersecurity Dive for top news, trends & analysis Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. MOST POPULAR 1. White House says 9th telecom company hit in Salt Typhoon spree 2. At least 8 US companies hit in telecom attack spree, officials say 3. CISA mobile security advice gets personal in wake of telecom intrusions 4. Feds raise alarm on China-linked infiltration of telecom networks LIBRARY RESOURCES * Webinar - on demand Reducing Mobile Risk: Smishing, Quishing, and Executive Impersonation Custom content for Lookout * Trendline The biggest cybersecurity trends to watch for 2025 Supported by Wind River * Trendline Cybersecurity in the healthcare industry Supported by Imprivata View all COMPANY ANNOUNCEMENTS * Rumpke Data Breach Investigation From Migliaccio and Rathod * DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate Industry Standards From DigiCert * Migliaccio and Rathod Investigates Byte Federal Data Breach From Migliaccio and Rathod * Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Eva… From Cynet Security View all | Post a press release WHAT WE’RE READING * The Record Senior DHS official who launched cyber safety review board departs * Forbes Ukraine has been hit by its biggest ever cyber attack. * Reuters Chinese national cyber centre says U.S. hacks stole trade secrets from tech firms View all EVENTS * 17 MAR Conference Enterprise Connect Orlando, Florida Presented by Informa Connect * 24 MAR Conference Channel Partners Conference & Expo, co-located with MSP Summit Las Vegas, Nevada Presented by Informa Promote an event CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX Get the free daily newsletter read by industry experts Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter. -------------------------------------------------------------------------------- * * * * EXPLORE * About * Editorial Team * Contact Us * Newsletter * Purchase Licensing Rights * Press Releases * What We’re Reading REACH OUR AUDIENCE * Advertising * Post a press release * Promote an event RELATED PUBLICATIONS * CIO Dive -------------------------------------------------------------------------------- Industry Dive is an Informa TechTarget business. © 2024 TechTarget, Inc. or its subsidiaries. All rights reserved. | View our other publications | Privacy policy | Terms of use | Take down policy. Cookie Preferences / Do Not Sell This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. Search * Home * Topics * Strategy * Breaches * Vulnerability * Cyberattacks * Threats * Leadership & Careers * Policy & Regulation * Deep Dive * Library * Events * Press Releases GET CYBERSECURITY DIVE IN YOUR INBOX The free newsletter covering the top industry headlines Email: * Select user consent: By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at anytime. Sign up A valid email address is required. Please select at least one newsletter.