Strategy


  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

    By June 13, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Software vulnerabilities pile up at government agencies, research finds

    A Veracode report reveals that government networks have accumulated years of unresolved security flaws, putting them at serious risk of exploitation.

    By June 12, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • An IT professional works at a computer next to colleagues.
    Image attribution tooltip
    Courtesy of Johnson Controls
    Image attribution tooltip

    How AI agents could revolutionize the SOC — with human help

    AI agents aren’t foolproof, but they could soon replace some of the most common tasks for cyber defenders.

    By June 11, 2025
  • Board members
    Image attribution tooltip
    AnnaStills via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to create a compelling SOC narrative for executives

    Focus on financial impact, efficiency and risk management to ensure informed cybersecurity investment decisions. 

    By Pete Shoard, VP analyst, Gartner Cybersecurity Threat Detection & Response • June 9, 2025
  • President Donald Trump waves to a crowd at the White House on April 2, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order

    The White House accused the Biden administration of trying to “sneak problematic and distracting issues into cybersecurity policy.” 

    By June 6, 2025
  • Sean Cairncross stands on a stage in front of two microphones
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Trump’s national cyber director nominee dodges criticism of funding cuts

    Sean Cairncross said his managerial experience has prepared him well to lead a relatively new White House cyber unit.

    By June 5, 2025
  • SEC regulation securities laws
    Image attribution tooltip
    Hapabapa via Getty Images
    Image attribution tooltip

    Banking groups urge SEC to rescind Biden-era cybersecurity rule

    The rule has exposed companies to liability risks while failing to provide investors with “decision-useful” information, the coalition said in a recent letter.

    By Alexei Alexis • June 5, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Bipartisan bill proposes $50M cyber threat analysis program for energy sector

    “Our national security depends on a resilient and secure energy grid,” said Sen. John Hickenlooper, D-Colo. Experts say the new effort would be welcomed by the private sector.

    By Robert Walton • June 5, 2025
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    OlegAlbinsky via Getty Images
    Image attribution tooltip

    Trump’s cyber nominees gain broad industry support

    CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

    By Updated June 3, 2025
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.  

    By June 2, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    SentinelOne analysis links service disruption to software flaw

    The outage had major impacts on enterprise customers’ ability to manage security operations, although federal customers were not affected.

    By June 2, 2025
  • close up of a worker holding  up a tablet
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Outage disrupts some SentinelOne services

    Company executives said there was no indication the incident was the result of a security issue.

    By May 29, 2025
  • Group of business people holding a jigsaw puzzle pieces. Business solution integration concept.
    Image attribution tooltip
    courtneyk via Getty Images
    Image attribution tooltip

    Zscaler enters agreement to buy Red Canary

    The agreement allows Red Canary to scale, while helping Zscaler expand into MDR.

    By May 28, 2025
  • A picture of Masimo's headquarters building.
    Image attribution tooltip
    Mario Tama / Staff via Getty Images
    Image attribution tooltip

    Masimo says cyberattack will not prevent it from fulfilling orders

    The maker of patient monitoring devices said the incident will not have a material effect on its updated financial outlook.

    By May 27, 2025
  • A banner bearing the eagle-and-shield logo of the Cybersecurity and Infrastructure Security Agency and reading "America's Cyber Defense Agency" hangs over a conference booth that contains chairs, posters, speakers, and plants.
    Image attribution tooltip
    CISA. (2024). Retrieved from Flickr.
    Image attribution tooltip

    CISA loses nearly all top officials as purge continues

    Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive government-downsizing campaign.

    By May 27, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks beats earnings estimates amid consolidation, AI concerns

    Investors still have concerns about margins as the company uses incentives to drive customers into unified platform deals.

    By May 22, 2025
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.

    By Updated May 21, 2025
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip
    Opinion

    How hospitality companies can stay ahead of cyberattacks this summer

    Hotels are a popular target for cyberattacks, but industry collaboration and intelligence sharing can serve as defense mechanisms.

    By Pam Lindemoen • May 20, 2025
  • Image attribution tooltip
    Lintao Zhang via Getty Images
    Image attribution tooltip

    Researchers warn of China-backed espionage campaign targeting laid-off US workers

    A report by FDD says an elaborate online recruiting effort is using LinkedIn and fake online companies to gather sensitive intelligence.

    By May 20, 2025
  • A woman’s hand is asking an AI chatbot pre-typed questions & the Artificial Intelligence website is answering.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    AI is stirring mixed feelings among CFOs, survey finds

    The research highlights a “trust gap between the untested promise of AI and the wariness of security and privacy risks,” finance software company Kyriba said.

    By Alexei Alexis • May 19, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for extension of cyber info-sharing law

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • A legal technology concept
    Image attribution tooltip
    Dmitry Nogaev via Getty Images
    Image attribution tooltip

    Tennessee’s largest school district sues PowerSchool over data breach

    Memphis-Shelby County Schools’ federal lawsuit against the ed tech giant is among the latest that have been filed by over 100 other districts nationwide.

    By Anna Merod • May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises spent $2M for ransomware recovery

    The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.

    By May 12, 2025