Leadership & Careers


  • A man wearing glasses, a suit, and a red tie looks to his left
    Image attribution tooltip
    John McDonnell via Getty Images
    Image attribution tooltip

    FCC eliminates cybersecurity requirements for telecom companies

    Commissioners sharply disagreed over whether the rules were appropriate and necessary.

    By Nov. 20, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • Trendline

    CISO Strategy

    Corporate stakeholders want to better understand the risk calculus of their technology stacks, answering the lingering question: Are we a target? 

    By Cybersecurity Dive staff
  • Two men and a woman sit in chairs on a stage in front of a screen showing the logos of the Aspen Cyber Summit and Aspen Digital
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships

    Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.

    By Nov. 18, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA, eyeing China, plans hiring spree to rebuild its depleted ranks

    The agency will also change some of its workforce policies to avoid driving away talented staff.

    By Updated Nov. 18, 2025
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISO pay is on the rise, even as security budgets tighten

    Companies are increasingly lavishing benefits on their top security executives, a recent report found.

    By Nov. 17, 2025
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    SonicWall says state-linked actor behind attacks against cloud backup service

    CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.

    By Nov. 6, 2025
  • The letters A and I stand on a digital background in a conceptual graphic designed to represent artificial intelligence.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security leaders say AI can help with governance, threat detection, SOC automation

    Executives and technical leaders differ on AI priorities, according to a report from Amazon.

    By Nov. 3, 2025
  • EY offices stand in 1 More London Riverside on October 1, 2018 in London, England.
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    AI risks pack a punch, but governance provides a buffer

    Enterprises strengthen governance and focus on responsible practices as more than 3 in 5 suffer AI risk-related losses of more than $1 million, EY data shows. 

    By Lindsey Wilkinson • Oct. 29, 2025
  • The United Nations logo is seen on a fence.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    UN member states sign cybercrime agreement despite industry, activist opposition

    Critics say the new convention is ripe for abuse by authoritarian countries.

    By Oct. 27, 2025
  • A gartner analyst gives a keynote speech in front of thousands of attendees.
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip

    Climbing costs, skills loss and other AI warnings for CIOs

    Amid seismic change for IT leaders, enterprises need to curate survival kits to mitigate reliability and cost challenges, Gartner analysts said. 

    By Lindsey Wilkinson • Oct. 23, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Burned-out security leaders view AI as double-edged sword

    As companies face cybersecurity skills gaps and broader attack surfaces, they’re warily turning to AI-powered automation.

    By Oct. 23, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s international, industry and academic partnerships slashed

    The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.

    By Oct. 22, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to prepare for and respond to today’s evolving threat landscape

    With the emergence of AI, security operations teams must navigate a fast-moving generation of cyber threats.

    By Jeremy D'Hoinne, Distinguished Research VP, Gartner • Oct. 21, 2025
  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Top cybersecurity conferences to attend in 2026

    Security experts will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks.

    By , Oct. 20, 2025
  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

    By Oct. 20, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

    By Oct. 17, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CISA’s latest cuts reignite concerns among Democratic lawmakers

    A congressman on a key subcommittee suggests that shrinking CISA leaves Americans exposed to mounting cyber threats.

    By Oct. 15, 2025
  • an exterior shot of a corporate boardroom as a meeting takes place
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk

    Companies are concerned about deepfakes and unauthorized AI tools, and board committees are increasing their oversight responsibilities.

    By Oct. 15, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Layoffs, reassignments further deplete CISA

    Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets.

    By Oct. 14, 2025
  • Stacks of american one hundred dollar bills.
    Image attribution tooltip
    aluxum via Getty Images
    Image attribution tooltip

    Risk mitigation budgets swell as enterprise AI adoption grows

    Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data.

    By Lindsey Wilkinson • Oct. 9, 2025
  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

    By Oct. 7, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025