Strategy


  • Trump’s CISA director pick withdraws after tumultuous nomination

    CISA has been without a permanent director for more than a year, imperiling its efforts to establish a strategic direction.  

    By April 22, 2026
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges security teams to view environments following axios compromise

    A suspected North Korea-linked actor is behind a supply chain attack on the widely used library.

    By April 21, 2026
  • a boardroom table surrounded by office chairs Explore the Trendline
    Image attribution tooltip
    IPGGutenbergUKLtd via Getty Images
    Image attribution tooltip
    Trendline

    The Cybersecurity Skills Gap

    From AI to federal budget cuts, the nature of cybersecurity work is changing faster than ever.

    By Cybersecurity Dive staff
  • banking technology
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Big banks seek to ease security worries as AI push accelerates

    “AI is our friend, OK?” said Morgan Stanley CEO Ted Pick during the bank’s earnings call as the industry grapples with its disruptive potential. 

    By Makenzie Holland • April 21, 2026
  • A light green Jeep Compass SUV on the assembly line at the Stellantis Melfi plant in Italy.
    Image attribution tooltip
    Courtesy of Stellantis
    Image attribution tooltip

    Stellantis teams with Microsoft to strengthen digital capabilities

    As part of the 5-year agreement, collaborative teams will co-develop more than 100 initiatives relating to AI and cybersecurity.

    By Eric Walz • April 20, 2026
  • A hand holds a magnifying glass up to a red exclamation point enclosed by a red triangle
    Image attribution tooltip
    tadamichi via Getty Images
    Image attribution tooltip

    Vulnerability exploitation surges often precede disclosure, offering possible early warnings

    Organizations can get ahead of major flaws with the right threat intelligence, according to a new report.

    By April 20, 2026
  • AI agent touch screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Vercel systems targeted after third-party tool compromised

    An employee using a consumer app was breached after granting too many permissions.

    By April 20, 2026
  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    CIOs fret over rising security concerns amid AI adoption

    AI is emerging as a critical tool and a growing threat as CIOs struggle to balance innovation with risk, according to a new report.

    By Scarlett Evans • April 16, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA cancels prestigious summer internships, citing government shutdown

    Experts worry that recent chaos in the scholarship program could undermine vital workforce-development efforts.

    By April 16, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST limits vulnerability analysis as CVE backlog swells

    The agency will stop adding detailed information to vulnerabilities that don’t meet certain criteria.

    By April 16, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC signals continued commitment to Cyber Trust Mark program

    The government approved a new lead overseer for its IoT device security labeling initiative.

    By Updated April 14, 2026
  • Team of professionals meeting in office around computers
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs see gaps in their incident response playbooks

    A survey by Sygnia reveals that senior-level security leaders fear they are not prepared to respond to the next cyberattack.

    By April 13, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker warns of earnings fallout from March cyberattack

    The medtech company was targeted in a wiper attack linked to an Iran-sponsored threat group.

    By April 10, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA’s vulnerability scans, field support on chopping block in Trump budget

    The president is proposing to shrink the agency by nearly 900 positions.

    By April 7, 2026
  • A person walks a runway in front of the Olympic rings.
    Image attribution tooltip
    Massimo Rosi via Getty Images
    Image attribution tooltip

    Olympic Games, FIFA World Cup offer huge platforms, rich cyberattack surface

    Global sporting events have become a lucrative target for criminal actors and geopolitical statements.

    By April 7, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s FY2027 budget again targets CISA

    The White House reiterated accusations about CISA’s counter-misinformation work to justify a major proposed reduction.

    By April 3, 2026
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Government agencies see cyber threats as major barrier to tech improvements

    Federal leaders also see opportunities to accelerate cyber defense with AI, according to a new report, but most agencies are still only testing AI tools.

    By April 3, 2026
  • Walmart retail credit card swipe fees Visa Mastercard
    Image attribution tooltip
    Jessica McGowan via Getty Images
    Image attribution tooltip

    Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities

    More than eight in 10 security leaders in the sector say they’ve rolled out an AI governance framework to some degree, a new survey found.

    By April 2, 2026
  • An illustration of agentic AI
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Cybersecurity risks shape AI adoption, but investment accelerates nonetheless

    Companies see cybersecurity as a top investment priority within their AI budgets, according to KPMG.

    By March 31, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    Iran actors’ claims raise questions about larger cyber threat to US, allies

    Questions are being raised about the veracity and tactics of Iran-linked actors, amid claims that a large trove of Lockheed Martin data is on the market.

    By Updated March 31, 2026
  • A banner reading "Power of Community" and "RSAC 2026 Conference" hangs over a walkway between two sets of escalators
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    ‘Missed opportunity’: US government’s absence from RSAC Conference leaves stark void

    The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said.

    By March 31, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity is the first line of defense, especially in an AI-fueled threat landscape

    Two new reports illustrate why companies need to do a better job of scrutinizing what their human employees and AI agents are doing.

    By March 27, 2026
  • Four men sit on a stage in front of an audience. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ‘Do not shift budgets to AI’: How businesses should and shouldn’t respond to evolving threats

    Experts said companies rushing to buy AI services risk letting their existing, still-vital defensive measures deteriorate.

    By March 25, 2026
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • Three women sit on a stage and one man stands on the stage with them. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    The CVE Program, a bedrock of global cyber defense, is teetering on the brink

    A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.

    By March 24, 2026
  • An executive in a business meeting room
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies face difficult choices in blaming hackers for an attack

    Publicly naming a hacking group can affect everything from retaliation to insurance coverage.

    By March 24, 2026