Strategy


  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 500 companies designate specialist roles to bolster security operations teams

    Four in 10 companies have created deputy CISO roles as regulatory concerns require greater board engagement.

    By Oct. 17, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    Auto sector faces historic cyber threats to business continuity

    A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business resilience and accountability.

    By Oct. 16, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • an exterior shot of a corporate boardroom as a meeting takes place
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk

    Companies are concerned about deepfakes and unauthorized AI tools, and board committees are increasing their oversight responsibilities.

    By Oct. 15, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Layoffs, reassignments further deplete CISA

    Some CISA staffers have been pushed out, while others are being told to move across the country for jobs outside their skill sets.

    By Oct. 14, 2025
  • Stacks of american one hundred dollar bills.
    Image attribution tooltip
    aluxum via Getty Images
    Image attribution tooltip

    Risk mitigation budgets swell as enterprise AI adoption grows

    Governing AI comes at a cost, with most organizations increasing oversight investments in the next financial year, according to OneTrust data.

    By Lindsey Wilkinson • Oct. 9, 2025
  • Bills on a table
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risk a growing priority among insurance and asset management firms

    A report by Moody’s shows an emphasis on board-level oversight and spending in order to boost cyber resilience.

    By Oct. 9, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Public disclosures of AI risk surge among S&P 500 companies

    A report by The Conference Board shows companies are flagging concerns about cyber and reputational risk as they increase deployment.

    By Oct. 7, 2025
  • Artificial intelligence and machine learning concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses fear AI exposes them to more attacks

    More than half of companies have already faced AI-powered phishing attacks, a new survey finds.

    By Oct. 7, 2025
  • A green and white semitruck with the words "UNFI electric vehicle" above the cab.
    Image attribution tooltip
    Courtesy of UNFI
    Image attribution tooltip

    UNFI reports solid results as it recovers from cyberattack

    The grocery retailer and wholesaler has raised its sales expectations to reflect strong performance in recent months, CEO Sandy Douglas said during an earnings call.

    By Sam Silverstein • Oct. 2, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • People sit at desks, in front of illuminated computer monitors, in a dark room that has large computer screens on the back wall
    Image attribution tooltip
    Permission granted by Center for Internet Security
    Image attribution tooltip
    Deep Dive

    Federal cuts force many state and local governments out of cyber collaboration group

    The Multi-State Information Sharing and Analysis Center lost U.S. government funding at midnight, jeopardizing the cybersecurity of thousands of cash-strapped counties, cities and towns.

    By Oct. 1, 2025
  • A jet flying in the sky.
    Image attribution tooltip

    Courtesy of GKN Aerospace.

    Image attribution tooltip

    CMMC is coming, but most contractors still have a long road to full compliance

    A new survey illustrates the defense industrial base’s fragmented security posture.

    By Oct. 1, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover to resume some manufacturing within days

    The U.K. will support a $2 billion loan guarantee to help restore the automaker’s supply chain after a cyberattack disrupted production.

    By Sept. 29, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurance could greatly reduce losses from diversification, mitigation measures

    A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and improving cyber hygiene.

    By Sept. 25, 2025
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges dependency checks following Shai-Hulud compromise

    Security teams are urged to review their software environments after a major supply chain attack on the NPM ecosystem.

    By Sept. 24, 2025
  • Stressed IT professional works late at night in a datacenter.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many ‘material’ cybersecurity breaches go unreported: VikingCloud

    The research also found that cyberattacks have escalated both in frequency and severity in the past year, with AI serving as a primary driver behind the surge.

    By Alexei Alexis • Sept. 23, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover to extend production pause into October following cyberattack

    Meanwhile, Stellantis said hackers gained access to some customer information in a third-party data breach.

    By Sept. 23, 2025
  • The letters AI on a digital block
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-powered vulnerability detection will make things worse, not better, former US cyber official warns

    Patching won’t be able to keep up with discovery, said Rob Joyce, who once led the National Security Agency's elite hacking team.

    By Sept. 22, 2025
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Preemptive security predicted to constitute about half of IT security spending by 2030

    The increasing use of AI will drive a demand for technology that can anticipate and neutralize threats, Gartner said in a new report.

    By Sept. 19, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST explains how post-quantum cryptography push overlaps with existing security guidance

    The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.

    By Sept. 19, 2025
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Evolving AI attacks, rapid model adoption worry cyber defenders

    IT defenders think many of their security tools aren’t ready for AI-powered cyberattacks, according to a new report.

    By Sept. 19, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Context is key in a world of identity-based attacks and alert fatigue

    A new report highlights why businesses struggle to separate true cyber threats from false positives.

    By Sept. 16, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Schools are getting better at navigating ransomware attacks, Sophos finds

    In 2025, 67% of global lower education providers said they stopped an attack before their stolen data was encrypted, the cybersecurity company reported.

    By Anna Merod • Sept. 16, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA audit sparks debate about cybersecurity pay incentives

    Some Cybersecurity and Infrastructure Security Agency employees believe a recent inspector general’s report partially missed the mark.

    By Sept. 15, 2025