Strategy


  • Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Moody’s forecasts growing AI threats, regulatory friction for 2026

    The U.S. and the EU continue to pursue starkly different regulatory agendas, the research firm noted.

    By Jan. 8, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.

    By Jen A. Miller • Jan. 8, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

    By Jan. 7, 2026
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover reports fiscal Q3 sales slump following cyberattack

    The hack forced the automaker to halt production for weeks and caused disruptions across the supply chain.

    By Jan. 6, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC IoT labeling program loses lead company after China probe

    It’s unclear if the FCC will seek to continue the program, which originated during the previous administration.

    By Updated Jan. 6, 2026
  • engineer
    Image attribution tooltip

    stock.adobe.com/john

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    From tech sprawl to clarity with XDR

    For organizations struggling with tech sprawl or alert fatigue, Cortex XDR offers a way to automate detection and response and adopt a more consolidated approach to endpoint security — without the wholesale replacement of your tech stack.

    Jan. 5, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST and MITRE partner to test AI defense technology for critical infrastructure

    Experts said the new partnership should focus on making AI-based systems more reliable.

    By Dec. 23, 2025
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

    By Dec. 23, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA loses key employee behind early ransomware warnings

    The future of a program that has helped prevent an estimated $9 billion in economic damages is now unclear.

    By Dec. 23, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says

    Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm.

    By Dec. 22, 2025
  • Senator Tom Cotton stares sternly into the distance
    Image attribution tooltip
    Kevin Dietsch via Getty Images
    Image attribution tooltip

    Top lawmaker asks White House to address open-source software risks

    The Senate Intelligence Committee’s chairman voiced concern about foreign adversaries tampering with code.

    By Dec. 19, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST adds to AI security guidance with Cybersecurity Framework profile

    Organizations have a new resource to map AI considerations onto NIST’s most famous security blueprint.

    By Dec. 17, 2025
  • A black office chair is pushed against a conference table in meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity concerns are paramount among executives in almost all roles, regions and industries

    A new survey finds widespread agreement that security is one of the biggest challenges facing companies today.

    By Dec. 15, 2025
  • Male IT Server Technician Specialist Holds Laptop and Looking on Raining Script Code in Rack Sever Cabinet.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs view hybrid environments as best way to manage risk, compliance

    Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.

    By Updated Dec. 15, 2025
  • Freight containers
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    The new frontline: How AI and automation are securing the supply chain

    In today’s digital economy, trust isn’t a given, it’s engineered across the entire supply chain.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Dec. 15, 2025
  • Person in data center
    Image attribution tooltip

    istockphoto.com/Jacob Wackerhausen

    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Fighting AI with AI: How midmarket teams can turn the tables on smarter threats

    AI has significantly lowered the barrier to entry for cybercrime.

    Dec. 15, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates cybersecurity benchmarks for critical infrastructure organizations

    The agency streamlines and supplements goals it first issued in 2022.

    By Dec. 12, 2025
  • Ransomware Malware Attack. Business Computer Hacked. Security Breach.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyberattacks force small firms to raise prices: ITRC

    The price hikes create a hidden “cyber tax” that is helping to fuel inflation, according to the report. 

    By Alexei Alexis • Dec. 11, 2025
  • A utility-scale battery storage system seen from above
    Image attribution tooltip
    Courtesy of Georgia Power
    Image attribution tooltip

    Grid-scale battery energy storage systems face heightened risk of cyberattack

    Experts warn that state-linked threat groups are actively searching for ways to disrupt the industry amid growing power demand in the U.S.

    By Dec. 11, 2025
  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of global firms plan to boost cyber spending in 2026

    A report by Marsh shows companies are also focused on third-party risk mitigation.

    By Dec. 9, 2025
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Initial access brokers involved in more attacks, including on critical infrastructure

    A research firm also finds nation-states aligning their cyberattacks more closely with geostrategic goals.

    By Dec. 8, 2025
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • AI assistant apps icons for OpenAI ChatGPT, Google Gemini and Anthropic Claude. are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Lawmakers question White House on strategy for countering AI-fueled hacks

    The Trump administration has said little about how it will prevent hackers from abusing AI.

    By Dec. 4, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA eliminates pay incentives as it changes how it retains top cyber talent

    Auditors had described the program as poorly managed. CISA is scrapping it in favor of another recruitment tool.

    By Dec. 3, 2025