Strategy


  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Acting CISA chief defends workforce cuts, declares agency ‘back on mission’

    Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.

    By Jan. 21, 2026
  • Two businesspeople -- one holding a calculator, the other with clasped hands -- sit facing each other at a table.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CFOs, CISOs clash over cybersecurity spending as threats mount: Expel

    Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.

    By Alexei Alexis • Jan. 21, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • UK authorities are warning about pro-Russia hacktivists targeting critical infrastructure and local governments in a January 2026 advisory.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UK authorities warn of pro-Russia groups targeting critical infrastructure, local government

    The alert comes just over a month after a joint advisory from CISA, the FBI and Western allies citing hacktivist activity against OT providers. 

    By Jan. 20, 2026
  • a high contrast image of two executives in a boardroom
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CEOs and CISOs differ on AI’s security value and risks

    A new report also found that American executives are more bullish on AI's potential than their British counterparts.

    By Jan. 20, 2026
  • Transmission towers against a dark sky
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US and allies collaborate on operational technology security guidance

    A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.

    By Jan. 16, 2026
  • A desk holds a mouse, a keyboard, and two computer screens with black wallpaper and the Department of Homeland Security logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    DHS prepares replacement for critical infrastructure collaboration framework

    It remains unclear if the new system will include liability protections that companies say are necessary.

    By Jan. 15, 2026
  • Businessman pointing at risk management concept on screen
    Image attribution tooltip
    guvendemir
    Image attribution tooltip

    AI surges among top business risk concerns, while cybersecurity holds firm

    A report from Allianz Commercial shows the rapid embrace of AI is posing new challenges for enterprise leaders.

    By Jan. 14, 2026
  • Trump resubmits Sean Plankey for CISA director

    It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.

    By Jan. 14, 2026
  • Business person uses software tool to help with tracking business performance.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of hedge funds boosted cybersecurity spending in 2025

    About half of firms suffered a breach, and a large percentage cited third-party risks.

    By Jan. 13, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

    By Jan. 12, 2026
  • person sitting at laptop
    Image attribution tooltip

    stock.adobe.com/Johannes

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    How to stop insider-driven data loss in browser sessions

    Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience.

    Jan. 12, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    CISA’s 7 biggest challenges in 2026

    From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.

    By Jan. 9, 2026
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Jan. 8, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

    By Jan. 7, 2026
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

    By Jan. 6, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC IoT labeling program loses lead company after China probe

    It’s unclear if the FCC will seek to continue the program, which originated during the previous administration.

    By Updated Jan. 6, 2026
  • engineer
    Image attribution tooltip

    stock.adobe.com/john

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    From tech sprawl to clarity with XDR

    For organizations struggling with tech sprawl or alert fatigue, Cortex XDR offers a way to automate detection and response and adopt a more consolidated approach to endpoint security — without the wholesale replacement of your tech stack.

    Jan. 5, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST and MITRE partner to test AI defense technology for critical infrastructure

    Experts said the new partnership should focus on making AI-based systems more reliable.

    By Dec. 23, 2025
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

    By Dec. 23, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA loses key employee behind early ransomware warnings

    The future of a program that has helped prevent an estimated $9 billion in economic damages is now unclear.

    By Dec. 23, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Senator Tom Cotton stares sternly into the distance
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Top lawmaker asks White House to address open-source software risks

    The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.

    By Dec. 19, 2025