Strategy


  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Private equity firm to acquire SolarWinds for $4.4B

    SolarWinds, which now will go private, was embroiled in a massive supply chain attack in 2020 linked to Russia-backed threat actors.

    By Feb. 7, 2025
  • Group of professionals collaborating in a bright, modern office space designed for co-working and teamwork.
    Image attribution tooltip
    miniseries via Getty Images
    Image attribution tooltip

    AI agents spark interest, concern for businesses in 2025

    Leaders have high hopes for autonomous capabilities, but adding the technology will raise the stakes for security and governance.

    By Lindsey Wilkinson • Feb. 6, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • DeepSeek logo in front of China's flag.
    Image attribution tooltip
    Anthony Kwan/Getty Images via Getty Images
    Image attribution tooltip

    DeepSeek surge hits companies, posing security risks

    The Trump administration is scrutinizing the AI app, Italy and Taiwan have banned it, and companies have blocked it.

    By Alexei Alexis • Feb. 5, 2025
  • Office workstation top view of business people working around M&A, keyboard, calculator, phablet and money on wooden table
    Image attribution tooltip
    Atstock Productions via Getty Images
    Image attribution tooltip

    Sophos completes $859M acquisition of Secureworks

    The deal comes amid a flurry of recent merger and acquisition deals in the cybersecurity sector.

    By Feb. 3, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    The cybersecurity outlook for 2025

    Threat actors are exploiting known weak points and enterprises’ dependency across the tech stack. It’s making cybersecurity professionals’ jobs harder than ever before. 

    By Cybersecurity Dive Staff • Feb. 3, 2025
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Security tool consolidation boosts efficiency, threat mitigation

    A study from IBM shows the controversial shift to platformization can pay off for enterprises. 

    By Jan. 31, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISO stature gains traction as global cyber risk escalates

    Security leaders are making inroads with corporate boards and now have a seat at the table with CEOs, a Splunk report shows.

    By Jan. 30, 2025
  • Engineer in network server room.
    Image attribution tooltip
    Stock photos via Getty Images
    Image attribution tooltip
    Deep Dive

    Network security tool defects are endemic, eroding enterprise defense

    When malicious hackers exploit vulnerabilities in firewalls, VPNs and routers, it’s not the vendors that get hit — it’s their customers.

    By Jan. 28, 2025
  • Exterior shot of a corporate campus,
    Image attribution tooltip
    Scott Olson/Getty Images via Getty Images
    Image attribution tooltip

    Procter & Gamble operations unhindered by Blue Yonder disruption

    The consumer goods company built an in-house solution to keep orders moving as its transportation management system provider navigated a ransomware attack.

    By Kelly Stroh • Jan. 28, 2025
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Biden administration rolls out wide-reaching cybersecurity executive order

    Released in the administration's final days, the highly-anticipated order follows a series of sophisticated attacks against federal agencies and critical infrastructure providers.

    By Jan. 16, 2025
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cyber disruptions remain top business risk concern in US, globally

    A report from Allianz shows the global disruption caused by CrowdStrike’s IT mishap added to longtime concerns about data breaches and ransomware.

    By Jan. 15, 2025
  • Executives are seen speaking during a meeting.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    World Economic Forum spotlights growing gap in cyber readiness

    Ransomware remains the top cyber risk concern among executives, but CISOs are almost twice as likely as CEOs to make that determination.

    By Jan. 15, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA pins modest security gains to performance goals program

    The federal agency said the number of critical infrastructure organizations enrolled in its vulnerability scanning program nearly doubled since 2022.

    By Jan. 14, 2025
  • Sponsored by Imprivata

    The double-edged sword of AI in cybersecurity: driving efficiency gains, meeting compliance requirements and navigating greater risk

    Discover the dual impact of AI in cybersecurity: enhancing efficiency and compliance while opening new risk avenues.

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Jan. 13, 2025
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA director reiterates prior calls for C-suites, boards to take cyber risk ownership

    Jen Easterly said companies need to consider cybersecurity threats as core risks that need to be fully incorporated into corporate business strategy.

    By Jan. 10, 2025
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    piranka via Getty Images
    Image attribution tooltip

    4 cybersecurity trends to watch in 2025

    Critical industries are up against never before seen challenges to remain secure and operational, while regulatory pressures have completely upended the role of the CISO in corporate America.

    By , Jan. 9, 2025
  • Harry Coker Jr. speaking before the Foundation for the Defense of Democracies on Jan. 7, 2025.
    Image attribution tooltip
    Permission granted by Foundation for Defense of Democracies
    Image attribution tooltip

    National cyber director calls for deterrence against China-affiliated cyber threats

    Harry Coker Jr. said China and other adversaries cannot be allowed free reign to conduct malicious cyber activities.   

    By Jan. 9, 2025
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Investors narrow scope of cyber funding deals in 2024

    Total funding was up 9% year over year to $9.5 billion. More than half of all dollars raised went to late-stage rounds, Pinpoint Search Group said.

    By Jan. 8, 2025
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    White House program to certify the security of IoT devices goes live

    The White House is also working on an executive order to limit federal purchasing of connected products that meet the minimum security standards under the program.

    By Jan. 8, 2025
  • Artificial Intelligence Machine Learning Natural Language Processing Data Technology
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    What companies need to help secure AI

    Experts say MLOps will bridge the gap between development and operations, creating room for the inclusion of security and privacy practices, too.

    By Sue Poremba • Jan. 6, 2025
  • Apps for generative AI tools, including ChatGPT, Gemini and Copilot, are pictured on an Apple iPhone on Aug. 22, 2024 in Toronto, Canada.
    Image attribution tooltip
    Kenneth Cheung via Getty Images
    Image attribution tooltip

    Cyber leaders are bullish on generative AI despite risks: report

    Executives say they would overhaul tooling in exchange for better generative AI capabilities, according to a CrowdStrike survey.

    By Lindsey Wilkinson • Jan. 3, 2025
  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    White House says 9th telecom company hit in Salt Typhoon spree

    A senior official blamed the intrusions on lax security and said in one case the compromise of a single administrator account led to access of over 100,000 routers.

    By Dec. 27, 2024
  • Person waits to enter Apple Store in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CISA mobile security advice gets personal in wake of telecom intrusions

    The agency’s recommendations are not for the technically inept. Yet the extraordinary measures, including the use of encrypted apps, are applicable to all audiences.

    By Dec. 19, 2024
  • A facade of the U.S. Environmental Protection Agency signage on the wall of its building
    Image attribution tooltip
    Joe Cicak via Getty Images
    Image attribution tooltip

    Pennsylvania representative pitches bill to double cyber assistance for local water systems

    The proposed legislation comes amid a surge in ransomware and state-linked attacks against U.S. water utilities.

    By Dec. 17, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s pre-ransomware alerts nearly doubled in 2024

    The federal agency’s efforts to improve defenses surged in fiscal year 2024. Yet, attacks continue to climb.

    By Dec. 17, 2024