Leadership & Careers


  • Magnifying glass with business report on financial advisor desk.
    Image attribution tooltip
    utah778 via Getty Images
    Image attribution tooltip

    Cyber, AI drive software spending to double-digit growth through 2029

    Cloud security and identity and access management tool purchases insulated the market from tariff-induced economic shocks, according to Forrester.

    By Matt Ashare • Aug. 21, 2025
  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks shares surge after company releases strong annual forecast

    The cybersecurity firm said its “platformization” strategy is beginning to pay dividends as more large customers consolidate their spending on its offerings.

    By Aug. 19, 2025
  • 3D digital circular dynamic wave. Explore the Trendline
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip
    Trendline

    CISO Strategy

    Corporate stakeholders want to better understand the risk calculus of their technology stacks, answering the lingering question: Are we a target? 

    By Cybersecurity Dive staff
  • A group of employees attend a hybrid attendance presentation from a small meeting room.
    Image attribution tooltip
    VM via Getty Images
    Image attribution tooltip

    Execs use responsible AI to drive growth, prevent risks

    Business leaders want to prevent further fallout as nearly all have experienced at least one problematic incident tied to AI, according to an Infosys survey.

    By Lindsey Wilkinson • Aug. 19, 2025
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Businesses focus on AI, cloud, despite cyber defense oversights

    Recent surveys found enterprises are enthusiastically adopting AI, even as they neglect basic cybersecurity measures.

    By Aug. 19, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    funky-data via Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • An aerial view shows large pools of water at a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Water sector expands partnership with volunteer hackers

    As threats to critical infrastructure grow and government funding stagnates, operators are turning to civic-minded volunteers from the cybersecurity industry.

    By Aug. 14, 2025
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    White House urged to revamp cyber regulations

    A leading trade group said the Trump administration should rein in a major pending cybersecurity rule as well as embrace AI-based cyber defenses.

    By Aug. 14, 2025
  • IT expert using digital tablet to operate network servers.
    Image attribution tooltip
    baranozdemir via Getty Images
    Image attribution tooltip

    US agencies, international allies issue guidance on OT asset inventorying

    The guidance includes specific examples for three critical infrastructure sectors that held workshops with CISA.

    By Aug. 13, 2025
  • nucor-eaf
    Image attribution tooltip
    Courtesy of Nucor
    Image attribution tooltip

    Financial impact from severe OT events could top $300B

    A report from industrial cybersecurity firm Dragos highlights growing risks of business interruption and supply-chain disruptions.

    By Aug. 12, 2025
  • A massive electronic screen that says "DEF CON 2025" and "HUMAN 33" hangs in a large atrium.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Cyber experts ponder a non-government future for the CVE program

    Organizations supporting the security vulnerability program said it needed changes to improve stability and rebuild trust.

    By Aug. 11, 2025
  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA officials say agency is moving ahead despite workforce purge

    Two senior officials defended the agency’s progress amid concerns about the effects of mass layoffs and budget cuts.

    By Aug. 8, 2025
  • An aerial view shows a series of buildings, parking lots, and highways
    Image attribution tooltip
    Patrick Smith via Getty Images
    Image attribution tooltip

    NSA partnering with cyber firms to support under-resourced defense contractors

    The spy agency has sought out creative ways to help protect small companies supplying the U.S. military.

    By Aug. 7, 2025
  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    US still prioritizing zero-trust migration to limit hacks’ damage

    The zero-trust initiative, which gained steam during the Biden administration, is still underway.

    By Updated Aug. 7, 2025
  • Bob Ackerman, founder and managing director of AllegisCyber and DataTribe moderates a Black Hat panel Aug. 5, 2025. Marci McCarthy, director of public affairs at CISA; Rob Joyce, Data Tribe venture partner and former cybersecurity director at the NSA and Patrick Opet, CISO at JPMorgan Chase.
    Image attribution tooltip
    Permission granted by Kesserling Communications
    Image attribution tooltip

    CISA’s relationship with industry needs work to reestablish trust, experts say

    Critics say budget cuts, job losses have hurt the agency’s ability to coordinate with private industry.

    By Aug. 6, 2025
  • Businessman holds electronic tablet showing profit data, while businesswoman holds hard-copy report.
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Cybersecurity budgets tighten as economic anxiety rises

    Uncertain tariff policies and fluctuating inflation and interest rates are leading to stagnant or reduced budgets, according to an IANS Research report.

    By Alexei Alexis • Aug. 5, 2025
  • Sean Cairncross stands on a stage in front of two microphones
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Senate confirms Trump’s national cyber director nominee

    Sean Cairncross, a political veteran without significant cybersecurity experience, could turn the relatively new White House office into a major player in the administration.

    By Aug. 3, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks to buy CyberArk for $25 billion

    The agreement could completely reshape the market for identity security, according to analysts.

    By July 30, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s Joint Cyber Defense Collaborative takes major personnel hit

    JCDC’s troubles add to the woes of the already-depleted CISA, which could lose even more personnel as additional contracts with private companies expire.

    By July 30, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Senators push CISA director nominee on election security, agency focus

    Sean Plankey said he would double down on CISA’s core mission and “allow the operators to operate.”

    By July 24, 2025
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

    By July 23, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Lapsed CISA contract impedes national lab’s threat-hunting operations

    The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

    By July 23, 2025
  • Aerial view of the Jack H. Wilson Water Treatment Plant in Little Rock, Arkansas.
    Image attribution tooltip
    Permission granted by Central Arkansas Water
    Image attribution tooltip
    Deep Dive

    Dwindling federal cyber support for critical infrastructure raises alarms

    A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

    By July 22, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    How IT leaders infuse cyber hygiene into daily work

    For technology chiefs, a “do as I say, not as I do” stance could lead to a security breach. Instead, cyber awareness can be taught by example.

    By Jen A. Miller • July 21, 2025
  • a headshot of mark ryland in business attire
    Image attribution tooltip
    Permission granted by Amazon
    Image attribution tooltip
    Q&A

    Amazon’s director of security on locking down enterprise AI

    "We've seen hype cycles before, but this one is a little different," Mark Ryland, director of security at Amazon, told CIO Dive.

    By Roberto Torres • July 18, 2025