The Latest

  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip
    Deep Dive

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

  • ADT sign outside of a private home
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    ADT employee account data stolen in cyberattack

    The alarm system company said an attacker accessed its network with compromised credentials obtained from an unnamed third party.

  • A facade of the U.S. Environmental Protection Agency signage on the wall of its building
    Image attribution tooltip
    Joe Cicak via Getty Images
    Image attribution tooltip

    American Water Works investigates unauthorized cyber intrusion

    The New Jersey-based utility said none of its water or wastewater operations were impacted by the hack.

  • A woman looks out the window, contemplative.
    Image attribution tooltip
    FG Trade via Getty Images
    Image attribution tooltip

    Gender gap persists in cybersecurity field despite available opportunities

    About half of women surveyed said they don’t feel like they would fit in or be able to be themselves, a Deloitte report said.

  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Counter Ransomware Initiative summit emphasizes arduous effort

    An international collective of cyber officials continued discussions with the White House on how to counter ransomware attacks, reduce payments and increase response capabilities.

  • An empty boardroom inside a corporate office, with an aerial view of New York City from the adjacent window
    Image attribution tooltip
    ismagilov via Getty Images
    Image attribution tooltip

    CISOs, C-suite remain at odds over corporate cyber resilience

    Security and IT executives, more than a year after a SEC vote on incident disclosure, still face an uphill battle to articulate risk strategy.

  • Single person away from the crowd standing out with dark shadows 3d render render
    Image attribution tooltip
    studio-fi via Getty Images
    Image attribution tooltip

    Economic uncertainty cools CISO hiring and compensation growth

    A report by IANS and Artico Search shows the pace of CISO hiring remained slow during the first half of 2024, but is beginning to ramp back up.

  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    United Airlines leaned on real-time data to recover from the CrowdStrike outage

    The airline modernized its technology foundations with better customer experiences in mind. Then, a major software outage underscored the importance of live data.

  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s vulnerability management program spotted 250 critical CVEs in 2023

    The 51 federal civilian agencies involved in the program remediated 872 vulnerabilities last year, up 78% increase from 2022, according to CISA.

  • Exterior of CrowdStrike office in Sunnyvale, California.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    What’s next for CrowdStrike on the road to repair its reputation?

    The cybersecurity vendor finds itself operating from a vulnerable position. Efforts to earn back trust are complex and some require industrywide support.

  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Ivanti up against another attack spree as hackers target its endpoint manager

    Ivanti customers are facing a new series of exploitation attempts after the company pledged in April to launch a comprehensive overhaul of its internal security practices.

  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Phishing remains cloud intrusion tactic of choice for threat groups

    The long-lasting effectiveness and success of phishing campaigns underscores the most central challenge in cybersecurity — people are the weakest link.

  • New York Gov. Kathy Hochul at a podium.
    Image attribution tooltip
    (2024). "Pausing Congestion Pricing to Address Affordability and the Cost of Living in New York" [Video]. Retrieved from Governor Kathy Hochul/Youtube.
    Image attribution tooltip

    State CISOs up against a growing threat environment with minimal funding, report finds

    A report by Deloitte and NASCIO warns that states do not have the resources necessary to fight state-backed and criminal threat groups.

  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Two-thirds of healthcare organizations hit by ransomware in past year: survey

    Nearly 40% of healthcare organizations reported it took more than a month to recover after an attack, according to the survey by cybersecurity firm Sophos.

  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    FCC reaches $31.5M settlement with T-Mobile over rash of data breaches

    The company agreed to a major change in board-level governance and will make a series of upgrades to boost its cyber resilience.

  • People enjoy the warm weather outside the White House on April 28, 2024 in Washington, DC.
    Image attribution tooltip
    Kent Nishimura via Getty Images
    Image attribution tooltip

    Ransomware attacks surge despite international enforcement effort

    Progress remains elusive as federal authorities point to ransomware payments inhibiting progress to reduce the volume and impact of attacks.

  • People walk past a sign for RSA Conference 2023
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Top cybersecurity conferences to attend in 2025

    Security experts from across sectors will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks. 

  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    CUPS vulnerability, a near miss, delivers another warning for open source

    While a major crisis was averted, the disclosures may open up needed conversations about transparency and coordination, according to researchers.

  • A over the shoulder shot of woman using smartphone with Two-Factor Authentication security while logging to laptop.
    Image attribution tooltip
    gahsoon via Getty Images
    Image attribution tooltip

    Customers are done with passwords. Do businesses have a solution?

    Research shows customers are frustrated with the login experience, and the friction can cost businesses customers.

  • Printer
    Image attribution tooltip
    Simonkr via Getty Images
    Image attribution tooltip

    A quartet of Linux CVEs draws exploit fears among open source community

    Attackers can use the chained vulnerabilities to execute remote commands after a user initiates a print job.

  • MoneyGram telephone sits on store counter.
    Image attribution tooltip
    Retrieved from Lynne Marek on March 04, 2022
    Image attribution tooltip

    MoneyGram faces backlog after cyberattack

    The international wire transfer company has restarted some services since the incident, but is battling to fulfill transactions after taking its systems offline for much of the week.

  • Man studying see-through display depicting computer code.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    For Google to reduce memory-safety defects, it focused on new code

    Google’s experience provides software developers a roadmap to address one of the most persistent security problems: memory-safety CVEs.

  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike CEO pushes ‘resilient by design’ framework, promising changes

    The cybersecurity vendor is embracing a new business framework to address security deployment lapses and the fragility of interconnected systems.

  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    CISA again raises alarm on hacktivist threat to water utilities

    The alert comes just days after an attack against a water treatment facility in Kansas.

  • CrowdStrike SVP Adam Meyers testifies to the House Subcommittee on Cybersecurity and Infrastructure Protection.
    Image attribution tooltip
    Anna Moneymaker / Getty Images via Getty Images
    Image attribution tooltip

    CrowdStrike’s mea culpa: 5 takeaways from the Capitol Hill testimony

    CrowdStrike was quick to apologize after a faulty content update triggered a global IT network outage. An executive detailed internal changes designed to prevent it from happening again.