Strategy


  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST and MITRE partner to test AI defense technology for critical infrastructure

    The National Institute of Standards and Technology is partnering with a nonprofit research organization to study how AI can boost the security of critical infrastructure. NIST on Monday announced that the agency and MITRE are creating an AI Economic Security Center to Secure U.S. Critical Infr...

    By Dec. 23, 2025
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

    By Dec. 23, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA loses key employee behind early ransomware warnings

    The future of a program that has helped prevent an estimated $9 billion in economic damages is now unclear.

    By Dec. 23, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Senator Tom Cotton stares sternly into the distance
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Top lawmaker asks White House to address open-source software risks

    The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.

    By Dec. 19, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST adds to AI security guidance with Cybersecurity Framework profile

    Organizations have a new resource to map AI considerations onto NIST’s most famous security blueprint.

    By Dec. 17, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

    By Dec. 15, 2025
  • Male IT Server Technician Specialist Holds Laptop and Looking on Raining Script Code in Rack Sever Cabinet.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs view hybrid environments as best way to manage risk, compliance

    Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.

    By Updated Dec. 15, 2025
  • Person in data center
    Image attribution tooltip

    istockphoto.com/Jacob Wackerhausen

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Fighting AI with AI: How midmarket teams can turn the tables on smarter threats

    AI has significantly lowered the barrier to entry for cybercrime.

    Dec. 15, 2025
  • Freight containers
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    The new frontline: How AI and automation are securing the supply chain

    In today’s digital economy, trust isn’t a given, it’s engineered across the entire supply chain.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Dec. 15, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates cybersecurity benchmarks for critical infrastructure organizations

    The agency streamlines and supplements goals it first issued in 2022.

    By Dec. 12, 2025
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks force small firms to raise prices: ITRC

    The price hikes create a hidden “cyber tax” that is helping to fuel inflation, according to the report. 

    By Alexei Alexis • Dec. 11, 2025
  • A utility-scale battery storage system seen from above
    Image attribution tooltip
    Courtesy of Georgia Power
    Image attribution tooltip

    Grid-scale battery energy storage systems face heightened risk of cyberattack

    Experts warn that state-linked threat groups are actively searching for ways to disrupt the industry amid growing power demand in the U.S.

    By Dec. 11, 2025
  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of global firms plan to boost cyber spending in 2026

    A report by Marsh shows companies are also focused on third-party risk mitigation.

    By Dec. 9, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Initial access brokers involved in more attacks, including on critical infrastructure

    A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.

    By Dec. 8, 2025
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • AI assistant apps icons for OpenAI ChatGPT, Google Gemini and Anthropic Claude. are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Lawmakers question White House on strategy for countering AI-fueled hacks

    The Trump administration has said little about how it will prevent hackers from abusing AI.

    By Dec. 4, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA eliminates pay incentives as it changes how it retains top cyber talent

    Auditors had described the program as poorly managed. CISA is scrapping it in favor of another recruitment tool.

    By Dec. 3, 2025
  • Camera or surveillance technology on screen display with abstract graphs and data surrounding it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Leading surveillance camera vendor signs CISA’s product-security pledge

    Axis Communications is the first major surveillance camera maker to vow to adhere to CISA’s security guidelines.

    By Dec. 3, 2025
  • A sign on the window of a door reads "City Hall, City of Baltimore, 1797"
    Image attribution tooltip
    Alex Wroblewski via Getty Images
    Image attribution tooltip

    Senators push to renew cyber grant program for state, local governments

    Security experts and local officials say the program is vital to protecting the country.

    By Dec. 2, 2025
  • Researchers warn that a threat group is preparing a campaign targeting Zendesk environments.
    Image attribution tooltip
    Courtesy of Zendesk
    Image attribution tooltip

    Hackers ready threat campaign aimed at Zendesk environments

    Researchers warn that hackers linked to recent social engineering attacks are targeting customer-service platforms. 

    By Updated Dec. 1, 2025
  • Cryptocurrency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    European police dismantle cryptocurrency mixer popular with ransomware gangs

    Authorities have spent years trying to cripple the ecosystem that helps hackers hide their profits.

    By Dec. 1, 2025
  • Cybersecurity, woman and computer with global network for phishing, ransomware and cyber search.
    Image attribution tooltip

    shutterstock.com/PeopleImages

    Image attribution tooltip
    Sponsored by ThreatLocker

    Emerging cybersecurity needs: What the market is telling us

    Default-deny, strict controls and real-time monitoring: how to stop threats before they start.

    By Yuriy Tsibere • Dec. 1, 2025
  • A person in an apparel store can be seen through a Black Friday sign in a store window.
    Image attribution tooltip
    Kena Betancur via Getty Images
    Image attribution tooltip
    Deep Dive

    Thanksgiving holiday weekend kicks off heightened threat environment for security teams

    As workers take family time and consumers race for Black Friday discounts, hackers gain an advantage to penetrate vulnerable corporate perimeters.

    By Nov. 26, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025