Strategy


  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    The administration vowed to increase the government’s use of AI for rapid cyber defense.

    By March 6, 2026
  • The exterior of the Department Health and Human Services headquarters.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS adds cybersecurity guidance to healthcare sector self-assessment tool

    Organizations can now use the online platform to test their readiness for digital security crises.

    By March 6, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Plankey’s nomination as CISA director now in jeopardy

    News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.

    By Updated March 5, 2026
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike reports record quarter amid investor concerns about AI impact

    CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers.

    By March 4, 2026
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    By Updated March 3, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By March 2, 2026
  • future
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    ResOps: The new operating model bridging security, identity and recovery

    Why 77% of enterprises lack AI security practices – and the new operating model bridging the gap.

    March 2, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Trump administration removes controversial acting CISA director

    The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.

    By Updated Feb. 27, 2026
  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Feb. 24, 2026
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.

    By Feb. 24, 2026
  • Person staring at code wall
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI vs. AI: Why cybersecurity’s new front line is behavioral intelligence

     Behavioral analytics and automation in the age of AI-driven cyber attacks.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Feb. 23, 2026
  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

    By Feb. 20, 2026
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO sees AI as demand driver, not a threat

    During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.

    By Updated Feb. 19, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Feb. 19, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

    By Feb. 18, 2026
  • mechanical gears and circuits
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    New security research finds governance determines trust in AI

    As AI adoption deepens, governance determines whether security teams can trust it.

    By Niall Heffernan, Staff GRC Analyst, Tines • Feb. 17, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated Feb. 13, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Microsoft prepares to refresh Secure Boot’s digital certificate

    Some customers, including in critical infrastructure sectors, will need to manually review their devices’ readiness for the update.

    By Feb. 10, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Illustration of five overlapping circles with stars transitioning to a sun, clouds, and hills. Set against a purple grid background with floating geometric shapes.
    Image attribution tooltip

    Tines

    Image attribution tooltip
    Sponsored by Tines

    New research: 3 big challenges facing security teams (and how to overcome them)

    New research from Tines shows AI adoption is high, but manual workloads and burnout persist.

    By Jennifer Cox, Director of Solutions Engineering, Tines • Feb. 9, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026