7 of this year's biggest cybersecurity stories – Cybersecurity Dive

From vendor evolution to the long-term effects of high-profile attacks, the cybersecurity industry is rapidly evolving. Take a look at our top stories to understand just how much has changed.
The cybersecurity industry is rapidly changing as companies contend with the constant threat of cyberattacks and regulators step in to raise security standards for the most critical sectors.
Sure, threat actors are getting smarter, but some of the most successful attacks are executed via mundane means (read phishing). 
This has raised the bar for security providers and changed how vendors position their products. Cyber insurers, too, must evolve to stay profitable.
Take a look at some of our top coverage from this year and let us know if there are any storylines we missed. You can send us a tip
The federal government and private sector are still coming to terms with how to protect operational technology in an increasingly volatile threat environment. Read the full article
The cloud leader doesn’t emphasize security and share information at the same level as its competitors. Experts say that's by design. Read the full article
Tenure matters, but not as you might suspect. Median total cash compensation dropped for CISOs in their roles at least five years, Heidrick & Struggles found.  Read the full article
Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable.  Read the full article
Everyone wants to stay on good terms with their employer. Threat actors know this too, and they exploit this weakness accordingly. Don’t fall for it. Read the full article
The platform reinforced its bid to become an all-inclusive security provider with forthcoming services for open source software and zero-trust architecture. Read the full article
High turnover means organizations are always on the lookout for new cybersecurity leadership, but what exactly are companies looking for in a CISO?  Read the full article
Get the free daily newsletter read by industry experts
Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
Text message and email-based authentication aren’t just the weakest variants of MFA. Cybersecurity professionals say they are broken.
Subscribe to Cybersecurity Dive for top news, trends & analysis
Get the free daily newsletter read by industry experts
Want to share a company announcement with your peers?
Get started
Physical keys with cryptographic protocols can deliver higher levels of assurance, but organizations shouldn’t conflate resistance with infallibility.
Text message and email-based authentication aren’t just the weakest variants of MFA. Cybersecurity professionals say they are broken.
The free newsletter covering the top industry headlines

source

Leave a Comment