Strategy


  • Patrick Opet, the global chief information security officer for JPMorgan Chase
    Image attribution tooltip

    JPMorgan Chase

    Image attribution tooltip

    JPMorgan Chase CISO warns software industry on supply chain security

    In an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market. 

    By April 28, 2025
  • Executives working through an AI training course.
    Image attribution tooltip
    Weedezign via Getty Images
    Image attribution tooltip

    AI impact on data breach outcomes remains ‘limited’: Verizon

    While AI-generated text in malicious emails has doubled, the rate of successful phishing breaches is stable.

    By Lindsey Wilkinson • April 23, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Financial gain still drives majority of cyber threat activity

    Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.

    By April 23, 2025
  • A sign reading "bank" hangs on a building.
    Image attribution tooltip
    assalve via Getty Images
    Image attribution tooltip

    Banks gear up to boost cybersecurity, cloud and data spending

    In the race to scale generative AI capabilities, executives plan to increase foundational technology investments, according to Broadridge.

    By Matt Ashare • April 22, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to build a secure enterprise cloud environment

    There are plenty of frameworks, tools and strategies to help map out a risk-resilient cloud infrastructure.

    By Richard Bartley, Research VP, Gartner • April 21, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder / Stringer via Getty Images
    Image attribution tooltip

    Microsoft strengthens in-house cyber governance, training

    The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.

    By April 21, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches new wave of job cuts

    Critics warn that drastic downsizing of the DHS unit will threaten the nation’s ability to counter cyber adversaries.

    By April 16, 2025
  • A family stands at a Delta Air Lines ticketing counter trying to rebook a flight after a CrowdStrike software update caused thousands of cancelations.
    Image attribution tooltip
    Jessica McGowan / Stringer via Getty Images
    Image attribution tooltip

    Aviation sector faces heightened cyber risks due to vulnerable software, aging tech

    A report calls on federal authorities to conduct comprehensive risk assessments and take steps to modernize the air traffic control system.

    By April 14, 2025
  • A person holding a laptop in a business suit and standing on a sidewalk
    Image attribution tooltip
    Permission granted by Browse Bravely, Palo Alto Networks
    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Why a secure enterprise browser should be on your security short list in 2025

    Secure enterprise browsers offer a solution to protect all data and users on any device, anywhere, and across all apps. Learn how that could benefit your organization.

    By Anupam Upadhyaya • April 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    CIOs worry about cyber threats, tech talent

    Tech executives grapple with a looming skills gap as they juggle cybersecurity with the speed of innovation, according to an Experis survey.

    By Nicole Laskowski • April 11, 2025
  • Rocket ships with animals going into space
    Image attribution tooltip
    Permission granted by 10k Media
    Image attribution tooltip
    Sponsored by 10k Media

    How AI Agents can help AppSec teams keep up with AI-generated code vulnerabilities

    While AppSec teams are stuck with legacy scanners and backlogs, developers and hackers have adopted AI tools to accelerate their respective objectives.

    By Charlie Klein, Director of Product Marketing, Jit • April 8, 2025
  • Commerce Secretary Lutnick on the White House lawn after speaking to the press.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    House members press Commerce Secretary Lutnick on DOGE-related job cuts at NIST

    The agency has already slashed dozens of probationary workers, and further cuts could have major consequences for cybersecurity standards and AI development. 

    By April 3, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Supatman via Getty Images
    Image attribution tooltip

    Enterprises beef up cybersecurity plans to mitigate AI risks

    More than 2 in 5 leaders say they’ve strengthened practices to curb increased threats, misuse and other vulnerabilities tied to using the technology.

    By Lindsey Wilkinson • March 31, 2025
  • Cybersecurity Challenges in Remote Work, exploring vulnerabilities, evolving threats, employee awareness, digital transformation impacts
    Image attribution tooltip

    stock.adobe.com/peera

    Image attribution tooltip
    Sponsored by Veracode

    How ASPM gives you control over complex architectures

    ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.

    By Sohail Iqbal, Chief Information Security Officer, Veracode • March 24, 2025
  • Google Cloud logo
    Image attribution tooltip
    Alexander Koerner / Stringer via Getty Images
    Image attribution tooltip

    Google acquisition of Wiz driven by enterprise embrace of multicloud

    The combined security platform will expand Google’s reach across a range of major cloud environments.

    By March 19, 2025
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI project failure rates are on the rise: report

    The share of businesses scrapping most of their AI initiatives increased to 42% this year, up from 17% last year, according to S&P Global Market Intelligence. 

    By Lindsey Wilkinson • March 18, 2025
  • The IBM logo is pictured on a sign in front of a building in Ontario, Canada on Oct. 30, 2018.
    Image attribution tooltip
    JHVEPhoto via Getty Images
    Image attribution tooltip

    Tech giants seek data standards amid AI push

    Microsoft, IBM and Cisco are among the vendors backing the OASIS Data Provenance Standards Technical Committee announced last week.

    By Matt Ashare • March 14, 2025
  • Federal Communications Commission Commissioner Brendan Carr
    Image attribution tooltip
    Kevin Dietsch / Getty Images via Getty Images
    Image attribution tooltip

    FCC launches national security unit to counter state-linked threats to US telecoms

    The new council is part of an effort to thwart Salt Typhoon and other cyber espionage groups.

    By March 13, 2025
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    82% of K-12 schools recently experienced a cyber incident

    Cybercriminals are increasingly targeting school networks through phishing and social engineering, a cybersecurity nonprofit reported.

    By Anna Merod • March 12, 2025
  • remote work
    Image attribution tooltip
    Oselote via Getty Images
    Image attribution tooltip

    Majority of ransomware claims involved compromise of perimeter security devices

    A report by cyber insurance firm Coalition shows six of every 10 ransomware claims involved compromised VPN or firewall.

    By March 11, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Former NSA cyber director warns drastic job cuts threaten national security

    Rob Joyce told lawmakers mass layoffs of federal workers will hurt the ability of the U.S. to combat malicious cyber activity from China and other adversaries.

    By March 10, 2025
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike shares fall as company forecasts lower-than-expected results

    The cybersecurity vendor is ending its customer commitment package, which was launched to help maintain existing relationships.

    By March 5, 2025
  • Rhode Island Chief Digital Officer Brian Tardiff and Gov. Dan McKee speak at a Dec. 30 press briefing on the cyberattack against the RIBridges social services database. The officials held a Jan. 10 briefing to notify thousands of recipients that breach notification letters were being mailed out.
    Image attribution tooltip
    Courtesy of Rhode Island
    Image attribution tooltip

    Critical infrastructure at state, local levels at heightened risk of cyberattacks

    State and local governments need additional resources, shared intelligence and coordination, an MS-ISAC report showed.

    By Feb. 28, 2025
  • Two IT technicians using a laptop in a server room.
    Image attribution tooltip
    Marco VDM via Getty Images
    Image attribution tooltip

    DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report

    The cybersecurity market could grow to $338 billion in value by 2033, driven in part by expanding AI risks, Bloomberg Intelligence analysts said.

    By Alexei Alexis • Feb. 26, 2025
  • Stacks of $100 Dollar bills increasing in size from left to right are pictured.
    Image attribution tooltip
    Henrik5000 via Getty Images
    Image attribution tooltip

    Global tech spend to approach $5 trillion this year: Forrester

    The U.S. market is expected to exceed $2 trillion for the first time, with financial services and insurance leading the charge, the analyst firm said.

    By Matt Ashare • Feb. 21, 2025