Strategy


  • Classic architecture details of a Bank building
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In financial sector, vendors lag behind customers on cybersecurity

    Financial firms should be performing regular oversight of their vendors to avoid supply chain compromises, according to a new report.

    By Nov. 6, 2025
  • In a close-up of a severely shattered monitor screen, the display contains blue and black hues with various-sized white cracks.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    SonicWall says state-linked actor behind attacks against cloud backup service

    CEO announces security and governance reforms inside the company, including the adoption of secure-by-design practices.

    By Nov. 6, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity-based attacks need more attention in cloud security strategies

    Companies should lock down user accounts and scan for compromised credentials, according to a new report.

    By Nov. 4, 2025
  • The letters A and I stand on a digital background in a conceptual graphic designed to represent artificial intelligence.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security leaders say AI can help with governance, threat detection, SOC automation

    Executives and technical leaders differ on AI priorities, according to a report from Amazon.

    By Nov. 3, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC will vote to scrap telecom cybersecurity requirements

    The commission’s Republican chair, who voted against the rules in January, calls them ineffective and illegal.

    By Updated Oct. 31, 2025
  • EY offices stand in 1 More London Riverside on October 1, 2018 in London, England.
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    AI risks pack a punch, but governance provides a buffer

    Enterprises strengthen governance and focus on responsible practices as more than 3 in 5 suffer AI risk-related losses of more than $1 million, EY data shows. 

    By Lindsey Wilkinson • Oct. 29, 2025
  • The Canary Wharf business district including global financial institutions Citigroup Inc., State Street Corp., Barclays Plc, HSBC Holdings Plc and the commercial office block No. 1 Canada Square, on the Isle of Dogs seen on June 22, 2023 in London, England.
    Image attribution tooltip
    Dan Kitwood / Staff via Getty Images
    Image attribution tooltip

    Financial services tech leaders tackle agentic AI governance

    Operating in a risk-averse industry, IT decision-makers are helping their businesses adapt to emerging threats without derailing momentum.

    By Lindsey Wilkinson • Oct. 24, 2025
  • A gartner analyst gives a keynote speech in front of thousands of attendees.
    Image attribution tooltip
    Permission granted by Gartner
    Image attribution tooltip

    Climbing costs, skills loss and other AI warnings for CIOs

    Amid seismic change for IT leaders, enterprises need to curate survival kits to mitigate reliability and cost challenges, Gartner analysts said. 

    By Lindsey Wilkinson • Oct. 23, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Burned-out security leaders view AI as double-edged sword

    As companies face cybersecurity skills gaps and broader attack surfaces, they’re warily turning to AI-powered automation.

    By Oct. 23, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA’s international, industry and academic partnerships slashed

    The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.

    By Oct. 22, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover attack cost British economy $2.5 billion

    The Cyber Monitoring Centre warned that losses could rise further if the company's production isn't back to pre-incident levels by January.

    By Oct. 22, 2025
  • Humanoid robot works in a call center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Social engineering gains ground as preferred method of initial access

    Senior executives and high-net-worth individuals are increasingly at risk as hackers use deepfakes, voice cloning and other tactics for targeted attacks. 

    By Updated Oct. 21, 2025
  • Individuals work on computers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Why security awareness training doesn’t work — and how to fix it

    Companies have built their security strategies around phishing simulations and educational webinars, tactics that research shows are ineffective.

    By Oct. 20, 2025
  • A graphic designed image of a lock
    Image attribution tooltip

    Wiparat/Adobe Stock

    Image attribution tooltip
    Sponsored by ScottMadden

    Federated security: Building resilient operating models in complex organizations

    Balance oversight and autonomy in complex organizations by building an aligned, scalable federated model for cybersecurity.

    By Henry Bell • Oct. 20, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

    By Oct. 17, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • an exterior shot of a corporate boardroom as a meeting takes place
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk

    Companies are concerned about deepfakes and unauthorized AI tools, and board committees are increasing their oversight responsibilities.

    By Oct. 15, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Layoffs, reassignments further deplete CISA

    Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets.

    By Oct. 14, 2025
  • Stacks of american one hundred dollar bills.
    Image attribution tooltip
    aluxum via Getty Images
    Image attribution tooltip

    Risk mitigation budgets swell as enterprise AI adoption grows

    Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data.

    By Lindsey Wilkinson • Oct. 9, 2025
  • Bills on a table
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risk a growing priority among insurance and asset management firms

    A report by Moody’s shows an emphasis on board-level oversight and spending in order to boost cyber resilience.

    By Oct. 9, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Public disclosures of AI risk surge among S&P 500 companies

    A report by The Conference Board shows companies are flagging concerns about cyber and reputational risk as they increase deployment.

    By Oct. 7, 2025
  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

    By Oct. 7, 2025
  • A green and white semitruck with the words "UNFI electric vehicle" above the cab.
    Image attribution tooltip
    Courtesy of UNFI
    Image attribution tooltip

    UNFI reports solid results as it recovers from cyberattack

    The grocery retailer and wholesaler has raised its sales expectations to reflect strong performance in recent months, CEO Sandy Douglas said during an earnings call.

    By Sam Silverstein • Oct. 2, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025