Cybersecurity

Yujin Kim/CIO Dive

Note from the editor

The rush to send employees home to work obliterated the legacy security perimeter. Companies had to rethink security policies reliant on the network perimeter. There was also an influx of software to protect, as companies turned to service-based technology models. 

Security threats did not dissapear with the new work constraints. Instead, CISOs watched cyberattack records shatter. Then news of a SolarWinds compromise made executives what, and who, in their supply chain they could trust.

To respond, and stay protected, organizations called on savvy security leaders to help them adapt. Companies are rethinking cyberthreats in the remote work landscape, addressing long held pain points (including the ever-present thorn of terrible passwords). 

Security decision makers are called to defend their organizations no matter what. The costs of failure, whether it's regulator scrutiny or tarnished reputations, are too high.  

Naomi Eide Senior Editor

Cyberthreat trends in the remote work landscape

With more workers logging in from home, companies face new cybersecurity challenges and opportunities.

• Published Jan. 25, 2021

Want to quickly recover from ransomware? Plan ahead

Security teams need to understand how the business will work when an attacker limits access to its systems.

• Published July 15, 2021

Post-SolarWinds, IT departments increase vendor scrutiny

It's still too soon to know the hack's full impact on IT, but so far, security experts report changing relationships with third-party vendors.

• Published March 12, 2021

6 types of CISO and the companies they thrive in

Jeff Pollard, VP and principal analyst at Forrester, wants CISOs to discover the type of leader they are — transformational, tactical, steady — and run with it.

• Published Sept. 22, 2020

Employees can't quit habit of writing down, sharing passwords

• Published April 6, 2021

Everyone is struggling with cloud security

With rising complexity, 96% of organizations are concerned about their cloud security, a Sophos report found. Misconfigurations are at the heart of the trouble.

• Published July 10, 2020

It's time to bridge the gap between security and development

More than 80% of developers knowingly release applications with insecure code, but experts say security and development don't have to be at odds.

• Published Aug. 10, 2021

5 charts that show the impact, and cost, of data breaches

"The saying 'time is money' applies here," said Chris Scott, director of Security Innovation and Remediation at IBM.

• Published July 29, 2020

The risk of disconnect between CIOs and CISOs

Companies need their CIO and CISO working together to reach their strategic goals. Strain in the relationship is a recipe for breaches.

• Published June 30, 2021

Biggest cybersecurity takeaways from 2020

The COVID-19 pandemic, and ensuing recession, turned security strategies upside down. The rush to send employees home to work obliterated the legacy security perimeter. However, security threats did not disappear with the new work constraints. Instead, CISOs saw a year where cyberattack records were shattered.

included in this trendline
  • Security pushes DevOps to breaking point
  • 5 charts that show the impact, and cost, of data breaches
  • The new cybersecurity priorities of 2020
Our Trendlines go deep on the biggest trends. These special reports, produced by our team of award-winning journalists, help business leaders understand how their industries are changing.
Davide Savenije Editor-in-Chief at Industry Dive.