Policy & Regulation


  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Oct. 30, 2025
  • A gas-fired power plant with smokestacks overlooks a road.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Canadian authorities warn of hacktivists targeting exposed ICS devices

    Hackers have manipulated critical components at water utilities and oil and gas and agricultural sites in recent weeks.

    By Oct. 30, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent says data breach originally began with 2024 intrusion

    The cyberattack, which affected several state agencies, has also impacted multiple insurance providers.

    By Oct. 27, 2025
  • The United Nations logo is seen on a fence.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    UN member states sign cybercrime agreement despite industry, activist opposition

    Critics say the new convention is ripe for abuse by authoritarian countries.

    By Oct. 27, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s international, industry and academic partnerships slashed

    The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.

    By Oct. 22, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    CISA’s latest cuts reignite concerns among Democratic lawmakers

    A congressman on a key subcommittee suggests that shrinking CISA leaves Americans exposed to mounting cyber threats.

    By Oct. 15, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Public disclosures of AI risk surge among S&P 500 companies

    A report by The Conference Board shows companies are flagging concerns about cyber and reputational risk as they increase deployment.

    By Oct. 7, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025
  • A jet flying in the sky.
    Image attribution tooltip

    Courtesy of GKN Aerospace.

    Image attribution tooltip

    CMMC is coming, but most contractors still have a long road to full compliance

    A new survey illustrates the defense industrial base’s fragmented security posture.

    By Oct. 1, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurance could greatly reduce losses from diversification, mitigation measures

    A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and improving cyber hygiene.

    By Sept. 25, 2025
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges dependency checks following Shai-Hulud compromise

    Security teams are urged to review their software environments after a major supply chain attack on the NPM ecosystem.

    By Sept. 24, 2025
  • A tesla robot
    Image attribution tooltip

    Jean-Luc stock.adobe.com

    Image attribution tooltip
    Sponsored by Schellman

    How to build a trustworthy AI governance roadmap aligned with ISO 42001

    Future-proof AI with a governance roadmap aligned to ISO 42001.

    Sept. 22, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST explains how post-quantum cryptography push overlaps with existing security guidance

    The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.

    By Sept. 19, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • The exterior of the U.S. Capitol on Jan. 3, 2024.
    Image attribution tooltip
    Colin Campbell/Cybersecurity Dive
    Image attribution tooltip

    House spending bill would reauthorize key cybersecurity programs

    The two programs, which encourage information sharing and fund local improvements, are seen as critical for national cyber resilience.

    By Sept. 17, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FBI warns about 2 campaigns targeting Salesforce instances

    The threat groups, identified as UNC6040 and UNC6395, have used different tactics to gain access to data.

    By Sept. 15, 2025
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA pledges robust support for funding, further development of CVE program

    A key official from the agency said the vulnerability management program will continue with additional participation and enhancements.

    By Sept. 12, 2025
  • National Cyber Director Sean Cairncross delivers keynote address at the Billington CyberSecurity Summit on Sept. 9, 2025.
    Image attribution tooltip
    Permission granted by Billington
    Image attribution tooltip

    National cyber director says US must shift risk burden toward adversaries

    In his first major address after confirmation, Sean Cairncross said the U.S. needs to take bold, coordinated steps to counter authoritarian rivals.

    By Sept. 10, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

    By Sept. 9, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

    By Sept. 2, 2025
  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    By Updated Aug. 29, 2025
  • World image
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US charges Oregon man in vast botnet-for-hire operation

    Federal prosecutors called Rapper Bot one of the most powerful DDoS botnets in history.

    By Aug. 21, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    NIST seeks input on control overlays for securing AI systems

    The federal agency plans to develop guidance to organizations about various AI use cases.

    By Aug. 18, 2025