Strategy


  • EY Forensic & Integrity Pulse survey, merging of cybersecurity and physical security, operational technology risk
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    More money is going to physical security, but it’s often CISOs that oversee it: EY

    Organizations should centralize physical security and cybersecurity so both are adequately prepared for, the consulting firm says in a survey report.

    By Robert Freedman • May 14, 2026
  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Frontier AI models reap rapid discovery of security vulnerabilities

    Security teams have just a few months before AI-driven exploitation becomes the norm, researchers warn.

    By May 14, 2026
  • a boardroom table surrounded by office chairs Explore the Trendlineâž”
    Image attribution tooltip
    IPGGutenbergUKLtd via Getty Images
    Image attribution tooltip
    Trendline

    The Cybersecurity Skills Gap

    From AI to federal budget cuts, the nature of cybersecurity work is changing faster than ever.

    By Cybersecurity Dive staff
  • Sam Altman speaks in a conference setting
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    OpenAI launches Daybreak to combat cyber threats

    The cybersecurity initiative uses AI to detect software vulnerabilities, partnering with Cloudflare, Cisco and CrowdStrike to counter threats.

    By Paige Gross • May 13, 2026
  • Cybersecurity concept of data protection in digital technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Sponsored by Guardrail Technologies

    Guardrail Technologies launches Traffic Light for Code & AIâ„¢; first security technology to verify & secure AI code and the people creating it

    PARK CITY, Utah (May 5, 2026) — Guardrail Technologies, the leading provider of AI security and governance software for enterprises building with AI, today announced the launch of Traffic Light for Code & AI™, which verifies both the code AI generates and the people...

    May 12, 2026
  • Artificial intelligence technology AI symbol digital concept 3d illustration
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity takes center stage as a leading factor in enterprise cyberattacks

    A new report shows two-thirds of ransomware attacks began with an identity-related breach.

    By May 12, 2026
  • A banner reading "Power of Community" and "RSAC 2026 Conference" hangs over a walkway between two sets of escalators
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI and an absent government: Takeaways from RSAC 2026

    Cybersecurity professionals discussed the balance between autonomy and oversight at the recent conference.

    By May 12, 2026
  • Electrical transmission towers and their power lines loom over trees at dusk
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip
    Deep Dive

    New cybersecurity industry coalition aims to lead US critical infrastructure protection

    The new Alliance for Critical Infrastructure’s biggest goal: changing how the nation plans for a major cybersecurity crisis.

    By May 11, 2026
  • Claude, AI startup, Anthropic
    Image attribution tooltip
    Permission granted by Anthropic
    Image attribution tooltip

    Anthropic’s Claude used in attempted compromise of Mexican water utility

    Researchers warn the incident highlights how AI tools can help untrained threat actors develop complex cyberattack capabilities.

    By May 8, 2026
  • A smartly-dressed businessman is resting in his office in front of his computer.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses eager but unprepared for AI to transform their security strategies

    Meanwhile, a new report found, companies are neglecting other basic security tools.

    By May 6, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST will test three major tech firms’ frontier AI models for cybersecurity risks

    After Anthropic’s announcement of Claude Mythos, agencies across the government are racing to get ahead of new AI models’ potential dangers.

    By May 6, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA urges critical infrastructure firms to ‘fortify’ before it’s too late

    As concerns mount about potential cyber sabotage by the Chinese government, the U.S. is warning operators to practice maintaining services in a degraded state.

    By Updated May 5, 2026
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    White House questions tech industry on defensive AI use, cybersecurity resilience

    Companies may be reluctant to answer some of the government’s questions, given the sensitive topics they address.

    By May 1, 2026
  • An illustration of agentic AI
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    US and allies urge ‘careful adoption’ of AI agents

    New guidance from a coalition of Western governments underscores the difficult-to-predict risks of still-evolving agentic tools.

    By May 1, 2026
  • PwC logo at NYC headquarters.
    Image attribution tooltip
    Spencer Platt/Staff via Getty Images
    Image attribution tooltip

    PwC partners with Google Cloud to take on the managed security market

    The professional services firm is stepping up its managed security ambitions with a Google Cloud-powered service that leans on agentic AI. The target market is companies that have outgrown DIY security.

    By Nidhi Sharma • April 30, 2026
  • Chris Skipworth, Passpack, password management, operational technology, connected building systems
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US agencies promote zero-trust practices for operational technology networks

    Many zero-trust defenses work differently in industrial environments than in traditional business networks, five federal agencies said in newly published guidance.

    By April 30, 2026
  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    State CISOs losing confidence in ability to manage cyber risks

    Deloitte-NASCIO study shows AI, budget pressures are forcing states to make tough decisions.

    By April 29, 2026
  • AI generated image of a smart city
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo

    When security becomes the attack surface: Why endpoint protection must evolve

    When attackers target security tools, protection must be resilient, self-healing and always on.

    By Nima Baiati, Vice President and General Manager, Commercial Software & Security Solutions, Lenovo • April 27, 2026
  • A massive lit-up sign with the tilted blue "Hasbro" logo and cartoon images looms over a dark room.
    Image attribution tooltip
    "Hasbro booth" by Gage Skidmore is licensed under CC BY-SA 2.0
    Image attribution tooltip

    Hasbro expects March cyberattack to impact second-quarter revenue

    The toymaker is reviewing files and working to fully bring certain systems back online. The company will incur some costs related to the investigation.

    By April 24, 2026
  • Image of a green computer screen with COBOL coding on it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-written software creates hassles for wary security teams

    A new report explains what cybersecurity practitioners need to see before they trust AI coding tools. 

    By April 23, 2026
  • Trump’s CISA director pick withdraws after tumultuous nomination

    CISA has been without a permanent director for more than a year, imperiling its efforts to establish a strategic direction.

    By Updated April 23, 2026
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges security teams to view environments following axios compromise

    A suspected North Korea-linked actor is behind a supply chain attack on the widely used library.

    By April 21, 2026
  • banking technology
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Big banks seek to ease security worries as AI push accelerates

    “AI is our friend, OK?” said Morgan Stanley CEO Ted Pick during the bank’s earnings call as the industry grapples with its disruptive potential. 

    By Makenzie Holland • April 21, 2026
  • A light green Jeep Compass SUV on the assembly line at the Stellantis Melfi plant in Italy.
    Image attribution tooltip
    Courtesy of Stellantis
    Image attribution tooltip

    Stellantis teams with Microsoft to strengthen digital capabilities

    As part of the 5-year agreement, collaborative teams will co-develop more than 100 initiatives relating to AI and cybersecurity.

    By Eric Walz • April 20, 2026
  • A hand holds a magnifying glass up to a red exclamation point enclosed by a red triangle
    Image attribution tooltip
    tadamichi via Getty Images
    Image attribution tooltip

    Vulnerability exploitation surges often precede disclosure, offering possible early warnings

    Organizations can get ahead of major flaws with the right threat intelligence, according to a new report.

    By April 20, 2026
  • AI agent touch screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Vercel systems targeted after third-party tool compromised

    An employee using a consumer app was breached after granting too many permissions.

    By April 20, 2026