Strategy


  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    TU IS via Getty Images
    Image attribution tooltip

    Context is key in a world of identity-based attacks and alert fatigue

    A new report highlights why businesses struggle to separate true cyber threats from false positives.

    By Sept. 16, 2025
  • a software developer writes code while using an external monitor in an office setting Explore the Trendline
    Image attribution tooltip
    Nattakorn Maneerat via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Supatman via Getty Images
    Image attribution tooltip

    Schools are getting better at navigating ransomware attacks, Sophos finds

    In 2025, 67% of global lower education providers said they stopped an attack before their stolen data was encrypted, the cybersecurity company reported.

    By Anna Merod • Sept. 16, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA audit sparks debate about cybersecurity pay incentives

    Some Cybersecurity and Infrastructure Security Agency employees believe a recent inspector general’s report partially missed the mark.

    By Sept. 15, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    JHVEPhoto via Getty Images
    Image attribution tooltip

    FBI warns about 2 campaigns targeting Salesforce instances

    The threat groups, identified as UNC6040 and UNC6395, have used different tactics to gain access to data.

    By Sept. 15, 2025
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA pledges robust support for funding, further development of CVE program

    A key official from the agency said the vulnerability management program will continue with additional participation and enhancements.

    By Sept. 12, 2025
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    stefanovsky via Getty Images
    Image attribution tooltip

    Researchers warn VoidProxy phishing platform can bypass MFA

    The service has been targeting Microsoft and Google accounts for months, opening the door to possible BEC attacks and data exfiltration.

    By Sept. 12, 2025
  • A person in business attire speaks while holding a card, with a blue background displaying the words "Billington Cybersecurity" in a tiled pattern.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    UK cyber leader calls for shift in focus toward continuity of critical services

    Richard Horne, CEO of the National Cyber Security Centre, said the U.S. remains a key ally in the global fight against sophisticated adversaries.

    By Sept. 11, 2025
  • Shoes sit on display tables and shelves in a store
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip
    Deep Dive

    How the retail sector teams up to defend against cybercrime

    The cyberthreat intel-sharing and collaboration group RH-ISAC is helping companies confront cyberattacks. But the challenge is delivering timely intelligence in a dynamic threat environment.

    By Sept. 11, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Senior NSC official said US needs to embrace offensive cyber

    Alexei Bulazel said the administration is unapologetically in favor of using offensive capabilities to deter the nation’s adversaries. 

    By Sept. 10, 2025
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    Ransomware insurance losses spike despite fewer claims: Resilience

    AI-powered phishing, “double extortion” tactics and insurance policy theft are fueling more destructive, costly ransomware attacks, the cybersecurity firm said.

    By Alexei Alexis • Sept. 10, 2025
  • National Cyber Director Sean Cairncross delivers keynote address at the Billington CyberSecurity Summit on Sept. 9, 2025.
    Image attribution tooltip
    Permission granted by Billington
    Image attribution tooltip

    National cyber director says US must shift risk burden toward adversaries

    In his first major address after confirmation, Sean Cairncross said the U.S. needs to take bold, coordinated steps to counter authoritarian rivals.

    By Sept. 10, 2025
  • cybersecurity stock photo
    Image attribution tooltip
    Yudram_TA via Getty Images
    Image attribution tooltip

    Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B

    The agreement is part of a larger strategy for Mitsubishi to develop one-stop security capabilities in the OT space.

    By Sept. 9, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

    By Sept. 9, 2025
  • App icons for generative AI assistants OpenAI ChatGPT, Google Gemini, Anthropic Claude, DeepSeek, Meta AI and xAI Grok are pictured on a smartphone screen.
    Image attribution tooltip
    Kenneth Cheung via Getty Images
    Image attribution tooltip

    Data security gaps stymy enterprise AI plans

    Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock.

    By Matt Ashare • Sept. 8, 2025
  • The exterior of a Marriott hotel is seen on February 11, 2025 in Miami, Florida.
    Image attribution tooltip
    Joe Raedle / Staff via Getty Images
    Image attribution tooltip

    Marriott checks out AI agents amid technology transformation

    The multinational hospitality giant is building a model-agnostic chassis featuring an agentic layer.

    By Lindsey Wilkinson • Sept. 5, 2025
  • Data privacy, cyber insurance
    Image attribution tooltip
    Khaosai Wongnatthakan via Getty Images
    Image attribution tooltip

    Swiss Re warns of rate deterioration in cyber insurance

    Competition among insurers has forced them to offer concessions on premiums, limits and controls.

    By Sept. 5, 2025
  • Vegetables sit on grocery store shelves
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip
    Deep Dive

    How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

    Food industry executives used to shrug off ransomware and cyber-espionage risks. A threat intel group is helping to change that, but its reach remains unclear.

    By Sept. 4, 2025
  • a screenshot of a virtual conversation between two panelists and a moderator in business attire
    Image attribution tooltip
    Roberto Torres/Cybersecurity Dive
    Image attribution tooltip

    How Tampa General Hospital worked to quantify cyber risk

    The medical center’s CIO and CISO teamed up to translate security decisions into dollars and cents.

    By Matt Ashare • Sept. 3, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

    By Sept. 2, 2025
  • An artificial intelligence processor unit
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip

    Safety-critical industries wary about using AI for cybersecurity

    Finance, tech and professional services are among the sectors with the widest adoption of AI-based security tools, according to a new report.

    By Aug. 27, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISOs grow more concerned about risk of material cyberattack

    A report by Proofpoint shows growing anxiety among security leaders about their companies’ cyber readiness.

    By Aug. 26, 2025
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Execs worry about unknown identity-security weaknesses

    Credential theft attacks prove that companies need to do better, but business leaders cited many reasons for slow progress.

    By Aug. 26, 2025
  • Two colleagues have a discussion at an office desk as one points to a laptop screen.
    Image attribution tooltip
    Dejan Marjanovic via Getty Images
    Image attribution tooltip

    IT, business leaders clash over cloud, data security

    Executives plan to increase IT spend despite disappointing returns on tech investments, according to Unisys.

    By Matt Ashare • Aug. 25, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA updates SBOM recommendations

    The document is primarily meant for federal agencies, but CISA hopes businesses will also use it to push vendors for software bills of materials.

    By Aug. 22, 2025