Deep Dive

Industry insights from our journalists

  • Three pathways for hackers to crash the US power grid
    Image attribution tooltip
    Adeline Kon/Cybersecurity Dive

    Hackers could crash the US power grid, but money, not sabotage, is their focus

    For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric Institute's Scott Aaronson said.

    Robert Walton • Nov. 2, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images

    What's under the hood of a medical device? Software bill of materials hits inflection point

    President Joe Biden's executive order calls for SBOMs, and the FDA wants to require premarket submissions to have an inventory of third-party device components. AdvaMed is concerned the data could be exploited by hackers.

    Greg Slabodkin • Oct. 11, 2021
  • Image attribution tooltip
    Jeenah Moon via Getty Images

    Microsoft, under attack from threat actors, positions itself as cyber guardian

    The pandemic created more business opportunity, but malicious actors dogged the company's technology stack. Now, the very same products touted as security defense tools are under fire. 

    David Jones • Sept. 29, 2021
  • Legacy medical devices, growing hacker threats create perfect storm of cybersecurity risks

    Hospitals are using more connected devices, many of which were not built with cybersecurity in mind, leaving healthcare organizations highly vulnerable to attacks.

    Greg Slabodkin • June 23, 2021
  • marijuana, computers, hiring
    Image attribution tooltip
    Adeline Kon for Cybersecurity Dive/Cybersecurity Dive

    Marijuana is becoming more accepted. Will cybersecurity employers play along?

    As more states legalize recreational use, employers in the public and private sectors may need to change how they hire for cybersecurity.

    Samantha Schwartz • April 20, 2021
  • A still of COVID-19 vaccine vials from Johnson & Johnson going through production
    Image attribution tooltip
    Permission granted by Johnson & Johnson

    4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain

    Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.

    Deborah Abrams Kaplan • April 7, 2021
  • Image attribution tooltip
    Danielle Ternes for CIO Dive

    Ransomware 2020: the scale, scope and impact of attacks on business

    In an international health crisis ripe with economic volatility, ransomware attacks have remained persistent. The fallout is growing more costly.

    Samantha Schwartz • Oct. 30, 2020
  • 'Golden bullet' clauses protect CISOs after a breach

    A financial cushion will not shield an executive from public scrutiny, but it can alleviate the burden of blame.

    Samantha Schwartz • Nov. 18, 2019
  • Image attribution tooltip
    Danielle Ternes for CIO Dive

    What industry gets wrong about cyber insurance

    Despite common perception, recovery from a cyber event — such as paying a ransom — cannot be decided by a carrier.

    Samantha Schwartz • Oct. 31, 2019