Strategy


  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

    By Jan. 28, 2026
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    By Updated Jan. 28, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Jan. 28, 2026
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Federal agencies abruptly pull out of RSAC after organizer hires Easterly

    The decision fits a pattern of government withdrawal from the cybersecurity community under the Trump administration.

    By Jan. 26, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

    By Jan. 23, 2026
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

    By Jan. 23, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Acting CISA chief defends workforce cuts, declares agency ‘back on mission’

    Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.

    By Jan. 21, 2026
  • Two businesspeople -- one holding a calculator, the other with clasped hands -- sit facing each other at a table.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CFOs, CISOs clash over cybersecurity spending as threats mount: Expel

    Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.

    By Alexei Alexis • Jan. 21, 2026
  • UK authorities are warning about pro-Russia hacktivists targeting critical infrastructure and local governments in a January 2026 advisory.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UK authorities warn of pro-Russia groups targeting critical infrastructure, local government

    The alert comes just over a month after a joint advisory from CISA, the FBI and Western allies citing hacktivist activity against OT providers. 

    By Jan. 20, 2026
  • a high contrast image of two executives in a boardroom
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CEOs and CISOs differ on AI’s security value and risks

    A new report also found that American executives are more bullish on AI's potential than their British counterparts.

    By Jan. 20, 2026
  • Transmission towers against a dark sky
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US and allies collaborate on operational technology security guidance

    A new report stresses the importance of logging, network segmentation and strong authentication, among other practices.

    By Jan. 16, 2026
  • A desk holds a mouse, a keyboard, and two computer screens with black wallpaper and the Department of Homeland Security logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    DHS prepares replacement for critical infrastructure collaboration framework

    It remains unclear if the new system will include liability protections that companies say are necessary.

    By Jan. 15, 2026
  • Businessman pointing at risk management concept on screen
    Image attribution tooltip
    guvendemir
    Image attribution tooltip

    AI surges among top business risk concerns, while cybersecurity holds firm

    A report from Allianz Commercial shows the rapid embrace of AI is posing new challenges for enterprise leaders.

    By Jan. 14, 2026
  • Trump resubmits Sean Plankey for CISA director

    It’s unclear when the Senate will act on Plankey’s nomination, which stalled last year after multiple senators blocked it.

    By Jan. 14, 2026
  • Business person uses software tool to help with tracking business performance.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of hedge funds boosted cybersecurity spending in 2025

    About half of firms suffered a breach, and a large percentage cited third-party risks.

    By Jan. 13, 2026
  • A clinical operating room with two medical professionals; one seated at a robotic surgery console and the other standing next to a patient covered in blue drapes with robotic arms positioned above.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Healthcare breaches double as shadow AI, vendor risks proliferate

    A new report paints a picture of a sector with limited confidence in its defensive capabilities.

    By Jan. 13, 2026
  • A digital map of the globe
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Executives worry most about cyber-enabled fraud, geopolitics and AI

    The World Economic Forum’s wide-ranging new report also found strong global support for cyber regulation.

    By Jan. 12, 2026
  • person sitting at laptop
    Image attribution tooltip

    stock.adobe.com/Johannes

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    How to stop insider-driven data loss in browser sessions

    Midmarket teams turn to secure browsers capable of providing deep visibility and enforcing granular user controls during user browsing sessions, the goal being to prevent intentional or unintentional leaks without adding friction to the user experience.

    Jan. 12, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    CISA’s 7 biggest challenges in 2026

    From infrastructure protection to improving morale, the cybersecurity agency has a lot on its plate — and it still lacks a leader.

    By Jan. 9, 2026
  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Jan. 8, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

    By Jan. 7, 2026
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

    By Jan. 6, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC IoT labeling program loses lead company after China probe

    It’s unclear if the FCC will seek to continue the program, which originated during the previous administration.

    By Updated Jan. 6, 2026