Strategy


  • A sign on the window of a door reads "City Hall, City of Baltimore, 1797"
    Image attribution tooltip
    Alex Wroblewski via Getty Images
    Image attribution tooltip

    Senators push to renew cyber grant program for state, local governments

    Security experts and local officials say the program is vital to protecting the country.

    By Dec. 2, 2025
  • Researchers warn that a threat group is preparing a campaign targeting Zendesk environments.
    Image attribution tooltip
    Courtesy of Zendesk
    Image attribution tooltip

    Hackers ready threat campaign aimed at Zendesk environments

    Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms. 

    By Updated 23 hours ago
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Cryptocurrency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    European police dismantle cryptocurrency mixer popular with ransomware gangs

    Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits.

    By Dec. 1, 2025
  • Cybersecurity, woman and computer with global network for phishing, ransomware and cyber search.
    Image attribution tooltip

    shutterstock.com/PeopleImages

    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere • Dec. 1, 2025
  • A person in an apparel store can be seen through a Black Friday sign in a store window.
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip
    Deep Dive

    Thanksgiving holiday weekend kicks off heightened threat environment for security teams

    As workers take family time and consumers race for Black Friday discounts, hackers gain an advantage to penetrate vulnerable corporate perimeters.

    By Nov. 26, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • A man wearing glasses, a suit, and a red tie looks to his left
    Image attribution tooltip
    John McDonnell via Getty Images
    Image attribution tooltip

    FCC eliminates cybersecurity requirements for telecom companies

    Commissioners sharply disagreed over whether the rules were appropriate and necessary.

    By Nov. 20, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC plan to scrap telecom cyber rules draws congressional backlash

    A prominent U.S. senator wants the commission to rethink its plans.

    By Nov. 19, 2025
  • Two men and a woman sit in chairs on a stage in front of a screen showing the logos of the Aspen Cyber Summit and Aspen Digital
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships

    Cyberattacks on the U.S. are “becoming more aggressive every passing day,” the national cyber director says.

    By Nov. 18, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports major earnings impact from cyberattack

    The automaker set aside hundreds of millions to help stabilize its massive international supply chain. 

    By Nov. 17, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA, eyeing China, plans hiring spree to rebuild its depleted ranks

    The agency will also change some of its workforce policies to avoid driving away talented staff.

    By Updated Nov. 18, 2025
  • DOJ antitrust, Trump nominee
    Image attribution tooltip
    Yin Yang via Getty Images
    Image attribution tooltip

    US chips away at North Korean IT worker fraud

    Authorities have described Pyongyang’s revenue-generating schemes as threats to U.S. national and economic security.

    By Nov. 17, 2025
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISO pay is on the rise, even as security budgets tighten

    Companies are increasingly lavishing benefits on their top security executives, a recent report found.

    By Nov. 17, 2025
  • Close up of hands typing on a keyboard illuminated in orange.
    Image attribution tooltip
    Sean Gallup/Getty Images via Getty Images
    Image attribution tooltip

    Western governments disrupt trifecta of cybercrime tools

    Authorities seized more than 1,000 servers and 20 domains in the operation.

    By Nov. 14, 2025
  • an exterior shot of the US capitol building
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Government funding bill temporarily revives cybersecurity information-sharing law

    The spending legislation passed by Congress will reauthorize the CISA 2015 program through the end of January.

    By Nov. 13, 2025
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies want more from their threat intelligence platforms

    Customers expect faster, more accurate and more relevant data, Recorded Future found in a new report.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Close up of a circuit board, essential for advancements in AI.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI agents worsen IT’s capacity crunch: S&P Global

    An infrastructure overhaul to support agentic systems is underway, bringing with it a new set of capacity demands and security considerations. 

    By Lindsey Wilkinson • Nov. 10, 2025
  • Data Breach Button on Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Conduent warns of further financial fallout from cyberattack

    The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year. 

    By Nov. 9, 2025
  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

    By Nov. 6, 2025
  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    SonicWall says state-linked actor behind attacks against cloud backup service

    CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.

    By Nov. 6, 2025
  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity-based attacks need more attention in cloud security strategies

    Companies should lock down user accounts and scan for compromised credentials, according to a new report.

    By Nov. 4, 2025
  • The letters A and I stand on a digital background in a conceptual graphic designed to represent artificial intelligence.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security leaders say AI can help with governance, threat detection, SOC automation

    Executives and technical leaders differ on AI priorities, according to a report from Amazon.

    By Nov. 3, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Updated Oct. 31, 2025