Strategy


  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated 10 hours ago
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Microsoft prepares to refresh Secure Boot’s digital certificate

    Some customers, including in critical infrastructure sectors, will need to manually review their devices’ readiness for the update.

    By Feb. 10, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Illustration of five overlapping circles with stars transitioning to a sun, clouds, and hills. Set against a purple grid background with floating geometric shapes.
    Image attribution tooltip

    Tines

    Image attribution tooltip
    Sponsored by Tines

    New research: 3 big challenges facing security teams (and how to overcome them)

    New research from Tines shows AI adoption is high, but manual workloads and burnout persist.

    By Jennifer Cox, Director of Solutions Engineering, Tines • Feb. 9, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • Two men sit on a stage in front of a blue backdrop bearing the logos of a conference and its sponsors
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    National cyber director solicits industry help in fixing regulations, threat information-sharing

    President Donald Trump’s chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects.

    By Feb. 3, 2026
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    National cybersecurity strategies depend on public-private trust, report warns

    An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans.

    By Feb. 3, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • A project engineer talks to a computer operator who points to screens showing AI and machine learning enhanced tools.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Q&A

    How Granite complied with new federal cyber regs before a critical deadline

    To reach Cybersecurity Maturity Model Certification Level 2, CTO Malcolm Jack learned implementation was as much about people as it was the technology.

    By Matthew Thibault • Jan. 30, 2026
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

    By Jan. 28, 2026
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    By Updated Jan. 28, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Jan. 28, 2026
  • CISA Director Jen Easterly speaking at RSA Conference 2022
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Federal agencies abruptly pull out of RSAC after organizer hires Easterly

    The decision fits a pattern of government withdrawal from the cybersecurity community under the Trump administration.

    By Jan. 26, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

    By Jan. 23, 2026
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    5 cybersecurity trends to watch in 2026

    Corporations across the globe are facing a dynamic risk environment, as AI adoption surges with few guardrails, business resilience takes center stage and the insurance industry raises major concerns about the U.S. cyber market.

    By Jan. 23, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Acting CISA chief defends workforce cuts, declares agency ‘back on mission’

    Lawmakers in both parties expressed concerns about CISA losing roughly a thousand employees.

    By Jan. 21, 2026
  • Two businesspeople -- one holding a calculator, the other with clasped hands -- sit facing each other at a table.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CFOs, CISOs clash over cybersecurity spending as threats mount: Expel

    Four in 10 finance leaders said quantified risk reduction would make it easier to justify a cybersecurity spending hike.

    By Alexei Alexis • Jan. 21, 2026
  • UK authorities are warning about pro-Russia hacktivists targeting critical infrastructure and local governments in a January 2026 advisory.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    UK authorities warn of pro-Russia groups targeting critical infrastructure, local government

    The alert comes just over a month after a joint advisory from CISA, the FBI and Western allies citing hacktivist activity against OT providers. 

    By Jan. 20, 2026
  • a high contrast image of two executives in a boardroom
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CEOs and CISOs differ on AI’s security value and risks

    A new report also found that American executives are more bullish on AI's potential than their British counterparts.

    By Jan. 20, 2026