Policy & Regulation


  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira actively engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Nov. 13, 2025
  • an exterior shot of the US capitol building
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Government funding bill temporarily revives cybersecurity information-sharing law

    The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.

    By Nov. 13, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Nevada Gov. Joe Lombardo standing in front of microphone with American and Nevada flags behind him
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    Nevada ransomware attack traced back to malware download by employee

    The state refused to pay a ransom and recovered 90% of the impacted data.

    By Nov. 7, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Updated Oct. 31, 2025
  • A gas-fired power plant with smokestacks overlooks a road.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Canadian authorities warn of hacktivists targeting exposed ICS devices

    Hackers have manipulated critical components at water utilities, oil and gas facilities, and agricultural sites in recent weeks.

    By Updated Oct. 31, 2025
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent says data breach originally began with 2024 intrusion

    The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.

    By Oct. 27, 2025
  • The United Nations logo is seen on a fence.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    UN member states sign cybercrime agreement despite industry, activist opposition

    Critics say the new convention is ripe for abuse by authoritarian countries.

    By Oct. 27, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s international, industry and academic partnerships slashed

    The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.

    By Oct. 22, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CISA’s latest cuts reignite concerns among Democratic lawmakers

    A congressman on a key subcommittee suggests that shrinking CISA leaves Americans exposed to mounting cyber threats.

    By Oct. 15, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Public disclosures of AI risk surge among S&P 500 companies

    A report by The Conference Board shows companies are flagging concerns about cyber and reputational risk as they increase deployment.

    By Oct. 7, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025
  • A jet flying in the sky.
    Image attribution tooltip

    Courtesy of GKN Aerospace.

    Image attribution tooltip

    CMMC is coming, but most contractors still have a long road to full compliance

    A new survey illustrates the defense industrial base’s fragmented security posture.

    By Oct. 1, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurance could greatly reduce losses from diversification, mitigation measures

    A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and improving cyber hygiene.

    By Sept. 25, 2025
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges dependency checks following Shai-Hulud compromise

    Security teams are urged to review their software environments after a major supply chain attack on the NPM ecosystem.

    By Sept. 24, 2025
  • A tesla robot
    Image attribution tooltip

    Jean-Luc stock.adobe.com

    Image attribution tooltip
    Sponsored by Schellman

    How to build a trustworthy AI governance roadmap aligned with ISO 42001

    Future-proof AI with a governance roadmap aligned to ISO 42001.

    Sept. 22, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST explains how post-quantum cryptography push overlaps with existing security guidance

    The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.

    By Sept. 19, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • The exterior of the U.S. Capitol on Jan. 3, 2024.
    Image attribution tooltip
    Colin Campbell/Cybersecurity Dive
    Image attribution tooltip

    House spending bill would reauthorize key cybersecurity programs

    The two programs, which encourage information sharing and fund local improvements, are seen as critical for national cyber resilience.

    By Sept. 17, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FBI warns about 2 campaigns targeting Salesforce instances

    The threat groups, identified as UNC6040 and UNC6395, have used different tactics to gain access to data.

    By Sept. 15, 2025
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA pledges robust support for funding, further development of CVE program

    A key official from the agency said the vulnerability management program will continue with additional participation and enhancements.

    By Sept. 12, 2025
  • National Cyber Director Sean Cairncross delivers keynote address at the Billington CyberSecurity Summit on Sept. 9, 2025.
    Image attribution tooltip
    Permission granted by Billington
    Image attribution tooltip

    National cyber director says US must shift risk burden toward adversaries

    In his first major address after confirmation, Sean Cairncross said the U.S. needs to take bold, coordinated steps to counter authoritarian rivals.

    By Sept. 10, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

    By Sept. 9, 2025