Strategy


  • A modern glass and steel building with horizontal lines and a large Google Cloud logo on the corner, featuring reflective windows and power lines crossing in front.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Google completes $32B acquisition of Wiz

    The cloud security specialist will continue to operate under its own brand and across multiple platforms. 

    By March 11, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By March 11, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

    By March 10, 2026
  • Two men wearing suits sit in white chairs on a stage
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration will test infrastructure cybersecurity approaches in pilot program

    The government can’t rely on a “universal solution” to the challenges facing vital services, a top White House official said.

    By March 9, 2026
  • A sign that says "Government Accountability Office" and shows the GAO's seal sits in front of the agency's headquarters
    Image attribution tooltip
    Retrieved from GAO.
    Image attribution tooltip

    Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say

    A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.

    By March 9, 2026
  • A woman seated at a desk, focused on her work at a computer.
    Image attribution tooltip

    Cisco Duo

    Image attribution tooltip
    Sponsored by Cisco Duo

    4 best practices to get IAM implementation right the first time

    Many enterprises are ready to upgrade IAM—a security framework that controls who can access which systems, data, and applications within an organization. Here are the best practices to follow for a successful IAM implementation.

    March 9, 2026
  • Illustration of a raised hand inside a doorway beneath a pink rainbow, surrounded by clouds, stars, a crescent moon, and abstract shapes on a dark purple grid background.
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    How AI will impact security careers and what leaders should do about it

    Security professionals are optimistic about AI’s impact on their careers, but challenges remain.

    By Jennifer Cox, Director of Solutions Engineering, Tines • March 9, 2026
  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

    By March 6, 2026
  • The exterior of the Department Health and Human Services headquarters.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS adds cybersecurity guidance to healthcare sector self-assessment tool

    Organizations can now use the online platform to test their readiness for digital security crises.

    By March 6, 2026
  • Plankey’s nomination as CISA director now in jeopardy

    News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.

    By Updated March 5, 2026
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike reports record quarter amid investor concerns about AI impact

    CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers.

    By March 4, 2026
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    By Updated March 3, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By March 2, 2026
  • future
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    ResOps: The new operating model bridging security, identity and recovery

    Why 77% of enterprises lack AI security practices – and the new operating model bridging the gap.

    March 2, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Trump administration removes controversial acting CISA director

    The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.

    By Updated Feb. 27, 2026
  • agentic AI business functions operations payments IT investment
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    In the AI era, CISOs worry about data leaks and doubt tech will solve skills gaps

    CISOs see AI as necessary but insufficient technology and fraught with risks, a new report found.

    By Feb. 24, 2026
  • CrowdStrike's super-sized statue of the threat group it calls Scattered Spider on the show floor at Black Hat on August 8, 2024.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat groups move at record speeds, as AI helps scale attacks

    A report by CrowdStrike shows cybercrime groups are outpacing security teams and increasingly abusing legitimate tools.

    By Feb. 24, 2026
  • Person staring at code wall
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI vs. AI: Why cybersecurity’s new front line is behavioral intelligence

     Behavioral analytics and automation in the age of AI-driven cyber attacks.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Feb. 23, 2026
  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

    By Feb. 20, 2026
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO sees AI as demand driver, not a threat

    During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.

    By Updated Feb. 19, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Feb. 19, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

    By Feb. 18, 2026
  • mechanical gears and circuits
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    New security research finds governance determines trust in AI

    As AI adoption deepens, governance determines whether security teams can trust it.

    By Niall Heffernan, Staff GRC Analyst, Tines • Feb. 17, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated Feb. 13, 2026