www.cybersecuritydive.com Open in urlscan Pro
2606:4700:4400::ac40:93a0  Public Scan

Submitted URL: https://link.cybersecuritydive.com/click/37753256.8986/aHR0cHM6Ly93d3cuY3liZXJzZWN1cml0eWRpdmUuY29tL3RvcGljL3N0cmF0ZWd5Lw/649073035...
Effective URL: https://www.cybersecuritydive.com/topic/strategy/?utm_source=Sailthru&utm_medium=email&utm_campaign=Issue:%202024-12-06%20Cybersec...
Submission: On December 30 via api from AE — Scanned from FR

Form analysis 6 forms found in the DOM

Name: signup-inter-formPOST /signup/

<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
  <input type="hidden" name="signup_box_location" value="interstitial">
  <input type="hidden" name="signup_initial_url_path" value="">
  <h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
  <p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
  <p class="form-error__message" id="interstitial-error"></p>
  <div id="form-interstitial">
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_9f34f3_email">
    <div id="newsletter-list-section">
    </div>
    <div id="interstitial-consent-container">
      <input name="user_consent" value="1" id="id_user_consent" type="checkbox">
      <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>.
        You can unsubscribe at anytime. </span>
    </div>
  </div>
  <input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-desktop">
    <span class="screen-reader-text search">Search</span>
  </label>
  <input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-drawer">
    <img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
  </button>
  <img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_d09799_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_d09799_email">
  </label>
  <input type="hidden" name="signup_box_location" value="sidebar">
  <input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
  <input type="hidden" name="js_enabled" value="1" id="id_d09799_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
      <label for="id_user_consent-sidebar">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_664a79_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_664a79_email">
  </label>
  <input type="hidden" name="signup_box_location" value="bottom">
  <input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
  <input type="hidden" name="js_enabled" value="1" id="id_664a79_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-bottom" value="1" class="checkbox">
      <label for="id_user_consent-bottom">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-mobile">
    <span class="screen-reader-text">Search</span>
    <input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
  </label>
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-mobile">
    <img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
  </button>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_819689_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_819689_email">
  </label>
  <input type="hidden" name="signup_box_location" value="integrated_menu">
  <input type="hidden" name="signup_initial_url_path" value="/topic/strategy/">
  <input type="hidden" name="js_enabled" value="1" id="id_819689_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
      <label for="id_user_consent-integrated_menu">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <script type="module" src="/static/js/dist/sendEmailToLytics.bundle.js?450616181224"></script>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Text Content

Skip to main content

CONTINUE TO SITE ➞



DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS

Let Cybersecurity Dive’s free newsletter keep you informed, straight from your
inbox.



By signing up to receive our newsletter, you agree to our Terms of Use and
Privacy Policy. You can unsubscribe at anytime.

 * Deep Dive
 * Library
 * Events
 * Press Releases
 * Topics

Sign up
 * Search
 * Sign up

Search
 * Strategy
 * Breaches
 * Vulnerability
 * Cyberattacks
 * Threats
 * Leadership & Careers
 * Policy & Regulation




STRATEGY

--------------------------------------------------------------------------------

 * Vitalii Pasichnyk/Getty via Getty Images
   
   
   WHITE HOUSE SAYS 9TH TELECOM COMPANY HIT IN SALT TYPHOON SPREE
   
   A senior official blamed the intrusions on lax security and said in one
   case the compromise of a single administrator account led to access of over
   100,000 routers.
   
   By Matt Kapko • Dec. 27, 2024
 * Justin Sullivan/Getty Images via Getty Images
   
   
   CISA MOBILE SECURITY ADVICE GETS PERSONAL IN WAKE OF TELECOM INTRUSIONS
   
   The agency’s recommendations are not for the technically inept. Yet the
   extraordinary measures, including the use of encrypted apps, are applicable
   to all audiences.
   
   By Matt Kapko • Dec. 19, 2024
 * Explore the Trendline➔
   .shock via Getty Images
   Trendline
   
   
   RISK MANAGEMENT
   
   Now, public companies have to detail their cybersecurity risk management in
   annual filings, raising awareness on what many cyber experts already knew —
   security issues are business issues. 
   
   By Cybersecurity Dive staff
 * Joe Cicak via Getty Images
   
   
   PENNSYLVANIA REPRESENTATIVE PITCHES BILL TO DOUBLE CYBER ASSISTANCE FOR LOCAL
   WATER SYSTEMS
   
   The proposed legislation comes amid a surge in ransomware and state-linked
   attacks against U.S. water utilities.
   
   By David Jones • Dec. 17, 2024
 * Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by
   yucelyilmaz via Getty Images
   
   
   CISA’S PRE-RANSOMWARE ALERTS NEARLY DOUBLED IN 2024
   
   The federal agency’s efforts to improve defenses surged in fiscal year 2024.
   Yet, attacks continue to climb.
   
   By Matt Kapko • Dec. 17, 2024
 * 
 * Adam Gray / Stringer via Getty Images
   
   
   EXECUTIVES SEE ANOTHER CROWDSTRIKE-LEVEL IT OUTAGE ON THE HORIZON
   
   IT and business leaders admit to prioritizing security at the expense of
   service disruption readiness, a PagerDuty report found.
   
   By Matt Ashare • Dec. 13, 2024
 * Permission granted by Snowflake
   
   
   SNOWFLAKE TO PHASE OUT SINGLE-FACTOR AUTHENTICATION BY LATE 2025
   
   The security policy change starts one year after a wave of attacks targeted
   more than 100 Snowflake customer environments without MFA.
   
   By Matt Kapko • Dec. 10, 2024
 * iStock / Getty Images Plus via Getty Images
   
   
   CREDIT RISK RISING AS ATTACKERS STRIKE LARGER COMPANIES: MOODY’S
   
   Cybercriminals are deploying generative AI tools in their efforts at
   ransomware and fraud, Moody’s Ratings said.
   
   By Jim Tyson • Dec. 10, 2024
 * Permission granted by Imprivata
   Sponsored by Imprivata
   
   
   FRONTLINE WORKFORCE TECH PREDICTIONS FOR 2025: A NEW ERA OF EFFICIENCY AND
   SECURITY
   
   2025 Predictions: Boosting frontline efficiency with passwordless tech and
   identity and access management innovations
   
   By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Dec. 9, 2024
 * 
 * Adam Gray / Stringer via Getty Images
   
   
   FOR IT PROS, THE CROWDSTRIKE CRISIS WAS A ‘CALL TO ARMS’
   
   The global outage triggered investments in people, processes and technologies
   to beef up enterprise resilience, Adaptavist research found.
   
   By Matt Ashare • Dec. 6, 2024
 * luza studios via Getty Images
   Opinion
   
   
   PROTECTING THE CLOUD: COMBATING CREDENTIAL ABUSE AND MISCONFIGURATIONS
   
   To defend against two of today’s biggest cloud security threats,
   organizations must adapt and develop proactive strategies, Google
   Cloud’s Brian Roddy writes. 
   
   By Brian Roddy • Dec. 5, 2024
 * Anna Moneymaker/Getty Images via Getty Images
   Q&A
   
   
   T-MOBILE UNDETERRED AS TELECOM SECTOR REELS FROM ATTACK CAMPAIGN
   
   Cybersecurity Dive spoke with CSO Jeff Simon about how the carrier says it
   thwarted a threat group resembling Salt Typhoon despite its past security
   failures.
   
   By Matt Kapko • Dec. 5, 2024
 * Alihan Usullu via Getty Images
   
   
   UK CYBER CHIEF WARNS COUNTRY IS AT AN INFLECTION POINT AS DIGITAL THREATS
   RISE
   
   In his first major speech, NCSC CEO Richard Horne said state linked and
   criminal threat groups are working to undermine the nation’s reliance on
   technology. 
   
   By David Jones • Dec. 3, 2024
 * 
 * The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
   
   
   WHEN PASSWORD RULES CHANGE, WHO BENEFITS?
   
   As the National Institute of Standards and Technology rolls out updated
   password guidance, some experts want to make passwords a thing of the past.
   
   By Sue Poremba • Dec. 2, 2024
 * stock photo via Getty Images
   
   
   FBI, CISA WARN OF HEIGHTENED RISK OF BEC ATTACKS DURING HOLIDAY SEASON
   
   Authorities encouraged prompt reporting, which can help recover stolen
   payments.
   
   By David Jones • Nov. 27, 2024
 * Justin Sullivan via Getty Images
   
   
   CROWDSTRIKE AVOIDS CUSTOMER EXODUS AFTER TRIGGERING GLOBAL IT OUTAGE
   
   The cybersecurity vendor reported $33.9 million in expenses related to the
   July 19 incident, which caused the company to swing to a loss.
   
   By Matt Kapko • Nov. 27, 2024
 * skynesher via Getty Images
   
   
   AS HOLIDAY SEASON BEGINS, US BRACES FOR LOOMING RISK OF CYBERATTACKS
   
   Security teams are on the alert for nation-state threats and ransomware as
   millions of workers break for a holiday.
   
   By David Jones • Nov. 26, 2024
 * Retrieved from Cedar Sinai.
   
   
   HEALTHCARE PROVIDERS WILL NEED TO BOOST CYBER DEFENSES AMID AI ADOPTION:
   MOODY’S
   
   AI could ease labor shortages, but health systems will need to increase
   cybersecurity spending to manage heightened risks, according to the credit
   ratings agency.
   
   By Emily Olsen • Nov. 22, 2024
 * Adam Gray via Getty Images
   
   
   MICROSOFT UNVEILS RESILIENCY, SECURITY ENHANCEMENTS FOLLOWING JULY GLOBAL IT
   OUTAGE
   
   The updates are part of a larger effort at the company to overhaul its
   internal security culture.
   
   By David Jones • Nov. 21, 2024
 * Matt Kapko/Cybersecurity Dive
   
   
   PALO ALTO NETWORKS BOASTS AS CUSTOMERS COALESCE ON ITS PLATFORMS
   
   The cybersecurity vendor said it ended its fiscal Q1 with 1,100
   platformization deals and remains on pace to reach at least 2,500 such deals
   within five years.
   
   By Matt Kapko • Nov. 21, 2024
 * Christopher Furlong/Getty via Getty Images
   Opinion
   
   
   SECURITY AWARENESS AND TRAINING IS A METHOD, NOT AN OUTCOME
   
   In 2024, the idea of human risk management shifted from concept to reality
   as frustrated CISOs looked for solutions beyond security awareness and
   training to make real change. 
   
   By Jinan Budge • Nov. 20, 2024
 * Justin Sullivan via Getty Images
   
   
   SPLUNK ACCELERATES CISCO’S SECURITY BUSINESS AS CORE NETWORKING SALES DECLINE
   
   Security revenue doubled to $2 billion in Cisco’s recent quarter. Without
   Splunk’s contribution, its total revenue would have dropped 14%.
   
   By Matt Kapko • Nov. 18, 2024
 * Permission granted by Office of the National Cyber Director
   
   
   NATIONAL CYBER DIRECTOR CALLS FOR STREAMLINED SECURITY REGULATIONS
   
   Harry Coker Jr. assured critical infrastructure and private sector
   stakeholders that while standards are necessary, there is a need to harmonize
   burdensome compliance demands. 
   
   By David Jones • Nov. 14, 2024
 * BNMK0819 via Getty Images
   Opinion
   
   
   WHO SHOULD BE IN THE ROOM WHEN PURCHASING CYBER INSURANCE?
   
   Cyber exposure should be treated just as seriously as a fire event, each with
   a high potential to disrupt business for extended periods of time, Peter
   Hedberg of Corvus Insurance writes. 
   
   By Peter Hedberg • Nov. 11, 2024
 * Bevan Goldswain via Getty Images
   Sponsored by University of New Hampshire
   
   
   EMPOWERING THE NEXT GENERATION OF CYBER LEADERS: MENTORING AND TALENT
   DEVELOPMENT INITIATIVES
   
   With guidance and support from mentorship programs and talent development
   initiatives, employees can become better equipped for success.
   
   Nov. 11, 2024
 * Jack Taylor / Stringer via Getty Images
   
   
   TECH EXECUTIVES REASSESS IT RESILIENCE IN CROWDSTRIKE OUTAGE AFTERMATH
   
   Nearly all organizations have known operational weaknesses that leave IT
   systems vulnerable to service interruptions, according to Cockroach Labs.
   
   By Matt Ashare • Nov. 8, 2024

More stories


GET THE FREE NEWSLETTER

Subscribe to Cybersecurity Dive for top news, trends & analysis

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



MOST POPULAR

 1. White House says 9th telecom company hit in Salt Typhoon spree
 2. At least 8 US companies hit in telecom attack spree, officials say
 3. CISA mobile security advice gets personal in wake of telecom intrusions
 4. Feds raise alarm on China-linked infiltration of telecom networks


LIBRARY RESOURCES

 * Webinar - on demand
   Reducing Mobile Risk: Smishing, Quishing, and Executive Impersonation Custom
   content for Lookout
 * Trendline
   The biggest cybersecurity trends to watch for 2025 Supported by Wind River
 * Trendline
   Cybersecurity in the healthcare industry Supported by Imprivata

View all


COMPANY ANNOUNCEMENTS

 * Rumpke Data Breach Investigation From Migliaccio and Rathod
 * DigiCert Releases First-of-Its-Kind Open-Source DCV Library to Elevate
   Industry Standards From DigiCert
 * Migliaccio and Rathod Investigates Byte Federal Data Breach From Migliaccio
   and Rathod
 * Only Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024
   MITRE ATT&CK Eva… From Cynet Security

View all | Post a press release


WHAT WE’RE READING

 * The Record Senior DHS official who launched cyber safety review board departs
 * Forbes Ukraine has been hit by its biggest ever cyber attack.
 * Reuters Chinese national cyber centre says U.S. hacks stole trade secrets
   from tech firms

View all


EVENTS

 * 17 MAR
   Conference Enterprise Connect Orlando, Florida
   Presented by Informa Connect
 * 24 MAR
   Conference Channel Partners Conference & Expo, co-located with MSP Summit Las
   Vegas, Nevada
   Presented by Informa

Promote an event



CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX

Get the free daily newsletter read by industry experts

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.


--------------------------------------------------------------------------------

 * 
 * 
 * 
 * 

EXPLORE

 * About
 * Editorial Team
 * Contact Us
 * Newsletter
 * Purchase Licensing Rights
 * Press Releases
 * What We’re Reading

REACH OUR AUDIENCE

 * Advertising
 * Post a press release
 * Promote an event

RELATED PUBLICATIONS

 * CIO Dive

--------------------------------------------------------------------------------

Industry Dive is an Informa TechTarget business.
© 2024 TechTarget, Inc. or its subsidiaries. All rights reserved. | View our
other publications | Privacy policy | Terms of use | Take down policy.
Cookie Preferences / Do Not Sell
This website is owned and operated by Informa TechTarget, part of a global
network that informs, influences and connects the world’s technology buyers and
sellers. All copyright resides with them. Informa PLC’s registered office is 5
Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget,
Inc.’s registered office is 275 Grove St. Newton, MA 02466.
Search
 * Home
 * Topics
   * Strategy
   * Breaches
   * Vulnerability
   * Cyberattacks
   * Threats
   * Leadership & Careers
   * Policy & Regulation
 * Deep Dive
 * Library
 * Events
 * Press Releases


GET CYBERSECURITY DIVE IN YOUR INBOX

The free newsletter covering the top industry headlines

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.