Strategy


  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of global firms plan to boost cyber spending in 2026

    A report by Marsh shows companies are also focused on third-party risk mitigation.

    By Dec. 9, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Initial access brokers involved in more attacks, including on critical infrastructure

    A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.

    By Dec. 8, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • AI assistant apps icons for OpenAI ChatGPT, Google Gemini and Anthropic Claude. are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Lawmakers question White House on strategy for countering AI-fueled hacks

    The Trump administration has said little about how it will prevent hackers from abusing AI.

    By Dec. 4, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA eliminates pay incentives as it changes how it retains top cyber talent

    Auditors had described the program as poorly managed. CISA is scrapping it in favor of another recruitment tool.

    By Dec. 3, 2025
  • Camera or surveillance technology on screen display with abstract graphs and data surrounding it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Leading surveillance camera vendor signs CISA’s product-security pledge

    Axis Communications is the first major surveillance camera maker to vow to adhere to CISA’s security guidelines.

    By Dec. 3, 2025
  • A sign on the window of a door reads "City Hall, City of Baltimore, 1797"
    Image attribution tooltip
    Alex Wroblewski via Getty Images
    Image attribution tooltip

    Senators push to renew cyber grant program for state, local governments

    Security experts and local officials say the program is vital to protecting the country.

    By Dec. 2, 2025
  • Researchers warn that a threat group is preparing a campaign targeting Zendesk environments.
    Image attribution tooltip
    Courtesy of Zendesk
    Image attribution tooltip

    Hackers ready threat campaign aimed at Zendesk environments

    Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms. 

    By Updated Dec. 1, 2025
  • Cryptocurrency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    European police dismantle cryptocurrency mixer popular with ransomware gangs

    Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits.

    By Dec. 1, 2025
  • Cybersecurity, woman and computer with global network for phishing, ransomware and cyber search.
    Image attribution tooltip

    shutterstock.com/PeopleImages

    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere • Dec. 1, 2025
  • A person in an apparel store can be seen through a Black Friday sign in a store window.
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip
    Deep Dive

    Thanksgiving holiday weekend kicks off heightened threat environment for security teams

    As workers take family time and consumers race for Black Friday discounts, hackers gain an advantage to penetrate vulnerable corporate perimeters.

    By Nov. 26, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • A man wearing glasses, a suit, and a red tie looks to his left
    Image attribution tooltip
    John McDonnell via Getty Images
    Image attribution tooltip

    FCC eliminates cybersecurity requirements for telecom companies

    Commissioners sharply disagreed over whether the rules were appropriate and necessary.

    By Nov. 20, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • Two men and a woman sit in chairs on a stage in front of a screen showing the logos of the Aspen Cyber Summit and Aspen Digital
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships

    Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.

    By Nov. 18, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports major earnings impact from cyberattack

    The automaker set aside hundreds of millions to help stabilize its massive international supply chain. 

    By Nov. 17, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA, eyeing China, plans hiring spree to rebuild its depleted ranks

    The agency will also change some of its workforce policies to avoid driving away talented staff.

    By Updated Nov. 18, 2025
  • DOJ antitrust, Trump nominee
    Image attribution tooltip
    Yin Yang via Getty Images
    Image attribution tooltip

    US chips away at North Korean IT worker fraud

    Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.

    By Nov. 17, 2025
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISO pay is on the rise, even as security budgets tighten

    Companies are increasingly lavishing benefits on their top security executives, a recent report found.

    By Nov. 17, 2025
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Western governments disrupt trifecta of cybercrime tools

    Authorities seized more than 1,000 servers and 20 domains in the operation.

    By Nov. 14, 2025
  • an exterior shot of the US capitol building
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Government funding bill temporarily revives cybersecurity information-sharing law

    The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.

    By Nov. 13, 2025
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Close up of a circuit board, essential for advancements in AI.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI agents worsen IT’s capacity crunch: S&P Global

    An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations. 

    By Lindsey Wilkinson • Nov. 10, 2025
  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent warns of further financial fallout from cyberattack

    The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year. 

    By Nov. 9, 2025