• Image attribution tooltip
    Permission granted by Gartner
    Sponsored by Gartner Peer Insights

    Cybersecurity quarterly benchmarks: Q1, 2022

    Gartner Peer Insights data and opinions run the gamut on cybersecurity maturity, budgets, and initiatives.

    May 23, 2022
  • Image attribution tooltip
    luza studios via Getty Images

    Critical VMware vulnerabilities resurface after threat actors evade patches within 48 hours

    Even with new patches available, CISA is concerned that threat actors will easily shake off the fixes once again.

    By Matt Kapko • May 19, 2022
  • Explore the Trendline
    Image attribution tooltip
    Yujin Kim/CIO Dive


    Security strategies benefit from nimbleness as companies respond to a pandemic, a boundless perimeter and questions about supply chain trust. 

    By CIO Dive staff
  • Image attribution tooltip
    atiatiati via Getty Images

    What cyber insurance companies want from clients

    Insurers evaluate how a company leverages technology and what internal standards are in place to manage risk.

    By Sue Poremba • April 28, 2022
  • Image attribution tooltip
    themotioncloud via Getty Images

    IT leaders remain bullish on open source despite security hiccups

    Enterprise adoption of open source has not cooled, but flaws have highlighted the need for a better understanding of dependencies. 

    By Brian Eastwood • April 25, 2022
  • Image attribution tooltip
    DKosig via Getty Images

    Threat detection accelerates in Asia, Europe, as notification trends shift

    As companies boost defenses and share threat intelligence, malicious actors have less time to escalate attacks.

    By David Jones • April 19, 2022
  • Image attribution tooltip
    Sam Wasson via Getty Images

    2 years later: What's next in security for the pandemic-era workforce

    Organizations can expect the return-to-work model to stress a corporate infrastructure that has languished in recent years. 

    By Sue Poremba • April 13, 2022
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images

    Federal authorities urged to bolster intel sharing amid nation-state threats

    Current Russian cyber activity has been limited, but experts called on federal authorities to keep providing actionable intelligence as risks endure.

    By David Jones • April 6, 2022
  • Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    Big tech is fixing bugs faster. Will that influence trickle down?

    If a customer lacks urgency in deploying a patch, a flaw can linger. 

    By Sue Poremba • April 1, 2022
  • Image attribution tooltip
    sakkmesterke via Getty Images
    Sponsored by Hyperproof

    The security challenge for 2022: Operating under a continuous assurance model

    Companies are turning to continuous assurance to answer increased compliance maturity expectations.

    March 28, 2022
  • Image attribution tooltip
    Alex Wong via Getty Images

    White House warns US of possible Russian cyberattack linked to Ukraine invasion

    The warnings come after federal authorities convened more than 100 critical infrastructure organizations to share classified cyberthreat information.

    By David Jones • March 21, 2022
  • Image attribution tooltip
    Sean Gallup via Getty Images

    Dinner is served: Cyber M&A feeding frenzy shows hunger for trust

    Google spent $5.4 billion to acquire Mandiant, which it plans to fold into Google Cloud. It was just one of 200-plus cybersecurity deals struck last year.

    By March 17, 2022
  • Image attribution tooltip
    Carsten Koall via Getty Images

    Russian state-sponsored actors target PrintNightmare, MFA settings

    ESET researchers are separately warning about new data wiping malware.

    By David Jones • March 16, 2022
  • Image attribution tooltip
    Drew Angerer via Getty Images

    Google swoops in to buy Mandiant for $5.4B after weeks of market speculation

    The deal follows reported negotiations between Microsoft and Mandiant, after the incident response specialist sold off its FireEye products business late last year.

    By David Jones • March 8, 2022
  • Image attribution tooltip
    Kenny Holston via Getty Images

    How to prepare employees for elevated cyber risk from the Ukraine crisis

    The conflict is still in its early stages, which may complicate employer response. But a good place to start may be to ensure baseline preparedness.

    By Ryan Golden • March 3, 2022
  • Image attribution tooltip
    Anastasia Vlasova via Getty Images

    Ukraine war tests cyber insurance exclusions

    Enterprise customers should expect higher premiums and more restrictive underwriting criteria, though a recent court ruling may force insurers to honor wartime claims.

    By David Jones • March 3, 2022
  • Image attribution tooltip
    Chris McGrath via Getty Images

    New cyberattacks emerge in Ukraine targeting government and industry

    Researchers say the release of new malware strains was planned for months.

    By David Jones • March 1, 2022
  • Image attribution tooltip
    Justin Sullivan via Getty Images

    Cyberattack on Nvidia results in data leak, credential theft

    The incident took place as Russia's war in Ukraine unfolds against a backdrop of U.S. warnings to protect critical industries.

    By , David Jones • Updated March 1, 2022
  • Image attribution tooltip
    Adam Berry via Getty Images

    Botnets, data wiping malware spread as Ukraine incursion begins

    A new variant of Cyclops Blink is now targeting Asus routers. 

    By David Jones • Updated March 18, 2022
  • Image attribution tooltip
    South_agency via Getty Images

    Ukraine conflict spotlights business need for cyber resilience

    In the crosshairs: critical infrastructure and companies with global operations.

    By Updated Feb. 24, 2022
  • Image attribution tooltip
    luza studios via Getty Images

    Security hampers enterprise cloud adoption: report

    Multicloud adoption adds complexity as IT security teams struggle with alert fatigue.

    By David Jones • Feb. 23, 2022
  • Image attribution tooltip
    iStock / Getty Images Plus via Getty Images

    Critical SAP vulnerabilities leave broad exposure, fixes require downtime

    Thousands of systems remain vulnerable, including applications not connected to the public internet. 

    By David Jones • Feb. 17, 2022
  • Image attribution tooltip
    sefa ozel via Getty Images

    Critical SAP vulnerabilities spur CISA, researcher pleas for urgent patching

    Onapsis security researchers warn attackers could take full control of systems to steal data, disrupt critical business functions and launch ransomware.

    By David Jones • Feb. 10, 2022
  • Image attribution tooltip
    AzmanL via Getty Images

    Security strategies evolve while spending flatlines

    Organizations want more bang for their buck, which can mean eschewing single-use products. 

    By Brian Eastwood • Feb. 9, 2022
  • Image attribution tooltip
    South_agency via Getty Images

    Cyberthreat trends to watch in 2022

    Cybercriminals are finding ways to manipulate corporate data, and for that problem, there really is no end in sight.

    By Sue Poremba • Jan. 31, 2022
  • Image attribution tooltip
    anyaberkut via Getty Images

    How Log4j is shaping enterprise security strategies

    Federal officials warned companies of the long-term implications of Log4j. Leaders are taking internal steps to keep threat actors at bay.

    By Jan. 27, 2022