Leadership & Careers: Page 3


  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Top cybersecurity conferences to attend in 2026

    Security experts will come together to hear about the latest risk management strategies, novel hacking techniques, cyber governance and the technologies enterprises need to defend their networks.

    By , Updated Feb. 2, 2026
  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

    By Oct. 20, 2025
  • Trendline

    CISO Strategy

    Corporate stakeholders want to better understand the risk calculus of their technology stacks, answering the lingering question: Are we a target? 

    By Cybersecurity Dive staff
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

    By Oct. 17, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CISA’s latest cuts reignite concerns among Democratic lawmakers

    A congressman on a key subcommittee suggests that shrinking CISA leaves Americans exposed to mounting cyber threats.

    By Oct. 15, 2025
  • an exterior shot of a corporate boardroom as a meeting takes place
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk

    Companies are concerned about deepfakes and unauthorized AI tools, and board committees are increasing their oversight responsibilities.

    By Oct. 15, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Layoffs, reassignments further deplete CISA

    Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets.

    By Oct. 14, 2025
  • Stacks of american one hundred dollar bills.
    Image attribution tooltip
    aluxum via Getty Images
    Image attribution tooltip

    Risk mitigation budgets swell as enterprise AI adoption grows

    Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data.

    By Lindsey Wilkinson • Oct. 9, 2025
  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

    By Oct. 7, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA to furlough 65% of staff if government shuts down this week

    Employees are worried about threatened mass firings and the cybersecurity ripple effects of a funding lapse.

    By Sept. 29, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST explains how post-quantum cryptography push overlaps with existing security guidance

    The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.

    By Sept. 19, 2025
  • The exterior of the U.S. Capitol on Jan. 3, 2024.
    Image attribution tooltip
    Colin Campbell/Cybersecurity Dive
    Image attribution tooltip

    House spending bill would reauthorize key cybersecurity programs

    The two programs, which encourage information sharing and fund local improvements, are seen as critical for national cyber resilience.

    By Sept. 17, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA audit sparks debate about cybersecurity pay incentives

    Some Cybersecurity and Infrastructure Security Agency employees believe a recent inspector general’s report partially missed the mark.

    By Sept. 15, 2025
  • A person in business attire speaks while holding a card, with a blue background displaying the words "Billington Cybersecurity" in a tiled pattern.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    UK cyber leader calls for shift in focus toward continuity of critical services

    Richard Horne, CEO of the National Cyber Security Centre, said the U.S. remains a key ally in the global fight against sophisticated adversaries.

    By Sept. 11, 2025
  • Shoes sit on display tables and shelves in a store
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip
    Deep Dive

    How the retail sector teams up to defend against cybercrime

    The cyberthreat intel-sharing and collaboration group RH-ISAC is helping companies confront cyberattacks. But the challenge is delivering timely intelligence in a dynamic threat environment.

    By Sept. 11, 2025
  • cybersecurity stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B

    The agreement is part of a larger strategy for Mitsubishi to develop one-stop security capabilities in the OT space.

    By Sept. 9, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

    By Sept. 9, 2025
  • Data privacy, cyber insurance
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Swiss Re warns of rate deterioration in cyber insurance

    Competition among insurers has forced them to offer concessions on premiums, limits and controls.

    By Sept. 5, 2025
  • Vegetables sit on grocery store shelves
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip
    Deep Dive

    How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

    Food industry executives used to shrug off ransomware and cyber-espionage risks. A threat intel group is helping to change that, but its reach remains unclear.

    By Sept. 4, 2025
  • a screenshot of a virtual conversation between two panelists and a moderator in business attire
    Image attribution tooltip
    Roberto Torres/Cybersecurity Dive
    Image attribution tooltip

    How Tampa General Hospital worked to quantify cyber risk

    The medical center’s CIO and CISO teamed up to translate security decisions into dollars and cents.

    By Matt Ashare • Sept. 3, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

    By Sept. 2, 2025
  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    By Updated Aug. 29, 2025
  • An artificial intelligence processor unit
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Safety-critical industries wary about using AI for cybersecurity

    Finance, tech and professional services are among the sectors with the widest adoption of AI-based security tools, according to a new report.

    By Aug. 27, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs grow more concerned about risk of material cyberattack

    A report by Proofpoint shows growing anxiety among security leaders about their companies’ cyber readiness.

    By Aug. 26, 2025