Leadership & Careers


  • Transmission towers against a dark sky
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US and allies collaborate on operational technology security guidance

    A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.

    By Jan. 16, 2026
  • A desk holds a mouse, a keyboard, and two computer screens with black wallpaper and the Department of Homeland Security logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    DHS prepares replacement for critical infrastructure collaboration framework

    It remains unclear if the new system will include liability protections that companies say are necessary.

    By Jan. 15, 2026
  • Trendline

    CISO Strategy

    Corporate stakeholders want to better understand the risk calculus of their technology stacks, answering the lingering question: Are we a target? 

    By Cybersecurity Dive staff
  • Trump resubmits Sean Plankey for CISA director

    It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.

    By Jan. 14, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

    By Jan. 12, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    CISA’s 7 biggest challenges in 2026

    From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.

    By Jan. 9, 2026
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Jan. 8, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

    By Jan. 7, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST and MITRE partner to test AI defense technology for critical infrastructure

    Experts said the new partnership should focus on making AI-based systems more reliable.

    By Dec. 23, 2025
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

    By Dec. 23, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA loses key employee behind early ransomware warnings

    The future of a program that has helped prevent an estimated $9 billion in economic damages is now unclear.

    By Dec. 23, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Senator Tom Cotton stares sternly into the distance
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Top lawmaker asks White House to address open-source software risks

    The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.

    By Dec. 19, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

    By Dec. 15, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates cybersecurity benchmarks for critical infrastructure organizations

    The agency streamlines and supplements goals it first issued in 2022.

    By Dec. 12, 2025
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • AI assistant apps icons for OpenAI ChatGPT, Google Gemini and Anthropic Claude. are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Lawmakers question White House on strategy for countering AI-fueled hacks

    The Trump administration has said little about how it will prevent hackers from abusing AI.

    By Dec. 4, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA eliminates pay incentives as it changes how it retains top cyber talent

    Auditors had described the program as poorly managed. CISA is scrapping it in favor of another recruitment tool.

    By Dec. 3, 2025
  • A sign on the window of a door reads "City Hall, City of Baltimore, 1797"
    Image attribution tooltip
    Alex Wroblewski via Getty Images
    Image attribution tooltip

    Senators push to renew cyber grant program for state, local governments

    Security experts and local officials say the program is vital to protecting the country.

    By Dec. 2, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Gainsight CEO promises transparency as it responds to compromise of Salesforce integration

    The company has been in regular contact with customers, and says only a handful have seen data directly impacted.

    By Updated Nov. 26, 2025
  • A man wearing glasses, a suit, and a red tie looks to his left
    Image attribution tooltip
    John McDonnell via Getty Images
    Image attribution tooltip

    FCC eliminates cybersecurity requirements for telecom companies

    Commissioners sharply disagreed over whether the rules were appropriate and necessary.

    By Nov. 20, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • Two men and a woman sit in chairs on a stage in front of a screen showing the logos of the Aspen Cyber Summit and Aspen Digital
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships

    Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.

    By Nov. 18, 2025