Strategy


  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    US authorities unmask North Korean IT worker schemes and their American accomplices

    Federal officials said businesses should carefully verify the identities of remote employees to avoid falling prey to similar scams.

    By June 30, 2025
  • A man holds an upside-down American flag and an Iranian flag as he marches down a street. Behind him, other people hold signs, one of which says, "No War On Iran."
    Image attribution tooltip
    Apu Gomes via Getty Images
    Image attribution tooltip

    US government warns of new Iran-linked cyber threats on critical infrastructure

    Companies should disconnect operational technology from the internet and enforce strong protections for user accounts, a joint alert from CISA, the FBI, NSA and DoD said.

    By June 30, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A technician programs an automation system
    Image attribution tooltip
    RainStar via Getty Images
    Image attribution tooltip

    Most building management systems exposed to cyber vulnerabilities, experts warn

    A study of over 467,000 building management systems across 500 organizations found that 2% of all devices essential to business operations had the highest level of risk exposure. 

    By Joe Burns • June 27, 2025
  • A screen showing a technical error message in an airport hallway
    Image attribution tooltip
    Jack Taylor via Getty Images
    Image attribution tooltip

    Microsoft to make Windows more resilient following 2024 IT outage

    The company has been working with security partners to make sure future software updates don’t lead to operational disruptions for customers.

    By Updated June 26, 2025
  • Brain Artificial Intelligence Chip
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    AI security issues dominate corporate worries, spending

    Two reports illustrate how business leaders are thinking about and budgeting for generative AI.

    By June 26, 2025
  • A pedestrian walks by a sign posted in front of an AT&T store.
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Judge approves AT&T’s $177M data breach settlement

    The settlement, which has received preliminary clearance, now awaits a December hearing for final approval.

    By Alexei Alexis • June 25, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    ‘Suspended animation’: US government upheaval has frayed partnerships with critical infrastructure

    Recent federal cuts, reorganizations and other disruptions have alarmed industry leaders, who say the government is a less reliable partner even as cyber threats increase.

    By June 25, 2025
  • regenerative agriculture
    Image attribution tooltip
    Scott Olson via Getty Images
    Image attribution tooltip

    Federal officials, critical infrastructure leaders remain on guard for Iran-linked hacks

    Amid an uneasy truce, security teams in the U.S. said they have not seen any credible or specific threats.

    By June 24, 2025
  • piece of paper saying insurance policy
    Image attribution tooltip
    Mohamad Faizal Bin Ramli via Getty Images
    Image attribution tooltip

    Cyber insurance premiums drop for first time, report finds

    Despite a decline in both premiums and prices, the market continues to be profitable.

    By June 24, 2025
  • AI powers big data analysis and automation workflows, showcasing neural networks and data streams for business.
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Businesses average 21 AI projects in production

    Enterprises plan to expand their portfolios by the end of the year, according to a Rackspace Technology survey.

    By Lindsey Wilkinson • June 23, 2025
  • Chairman of the Joint Chiefs of Staff Air Force Gen. Dan Caine discusses the mission details of a strike on Iran during a news conference at the Pentagon on June 22, 2025 in Arlington, Virginia. U.S. President Donald Trump gave an address to the nation last night after three Iranian nuclear facilities were struck by the U.S. military.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    DHS warns of heightened cyber threat as US enters Iran conflict

    Federal officials are warning that pro-Iran hacktivists or state-linked actors may target poorly secured U.S. networks.

    By June 23, 2025
  • Amy Herzog on stage speaking during a conference
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    AWS CISO stumps for security as an AI enabler

    AI’s rapid development underscores the need for secure foundations, Amy Herzog said Tuesday during the company’s annual cybersecurity conference.

    By Roberto Torres • June 20, 2025
  • New cars J.D. Power
    Image attribution tooltip
    Shaunl via Getty Images
    Image attribution tooltip

    FTC reminds car dealers to protect customer data

    The commission described how recently updated federal regulations affect dealerships — and their vendors.

    By Updated June 17, 2025
  • SEC seal outside Washington D.C. building
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    SEC scraps proposed cybersecurity rules for investment advisers, market participants

    The commission offered no rationale for removing rules that would have imposed security requirements on financial services providers.

    By Updated June 16, 2025
  • Fire and smoke arise after an attack on the Shahran oil depot in Tehran, Iran on June 15, 2025.
    Image attribution tooltip
    Stringer via Getty Images
    Image attribution tooltip

    US critical infrastructure could become casualty of Iran-Israel conflict

    Researchers warn that Iran-aligned threat groups could soon target U.S. companies and individuals in cyber espionage or sabotage attacks.

    By June 16, 2025
  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

    By June 13, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Software vulnerabilities pile up at government agencies, research finds

    A Veracode report reveals that government networks have accumulated years of unresolved security flaws, putting them at serious risk of exploitation.

    By June 12, 2025
  • An IT professional works at a computer next to colleagues.
    Image attribution tooltip
    Courtesy of Johnson Controls
    Image attribution tooltip

    How AI agents could revolutionize the SOC — with human help

    AI agents aren’t foolproof, but they could soon replace some of the most common tasks for cyber defenders.

    By June 11, 2025
  • Board members
    Image attribution tooltip
    AnnaStills via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to create a compelling SOC narrative for executives

    Focus on financial impact, efficiency and risk management to ensure informed cybersecurity investment decisions. 

    By Pete Shoard, VP analyst, Gartner Cybersecurity Threat Detection & Response • June 9, 2025
  • President Donald Trump waves to a crowd at the White House on April 2, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order

    The White House accused the Biden administration of trying to “sneak problematic and distracting issues into cybersecurity policy.” 

    By June 6, 2025
  • Sean Cairncross stands on a stage in front of two microphones
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Trump’s national cyber director nominee dodges criticism of funding cuts

    Sean Cairncross said his managerial experience has prepared him well to lead a relatively new White House cyber unit.

    By June 5, 2025
  • SEC regulation securities laws
    Image attribution tooltip
    Hapabapa via Getty Images
    Image attribution tooltip

    Banking groups urge SEC to rescind Biden-era cybersecurity rule

    The rule has exposed companies to liability risks while failing to provide investors with “decision-useful” information, the coalition said in a recent letter.

    By Alexei Alexis • June 5, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Bipartisan bill proposes $50M cyber threat analysis program for energy sector

    “Our national security depends on a resilient and secure energy grid,” said Sen. John Hickenlooper, D-Colo. Experts say the new effort would be welcomed by the private sector.

    By Robert Walton • June 5, 2025
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    OlegAlbinsky via Getty Images
    Image attribution tooltip

    Trump’s cyber nominees gain broad industry support

    CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

    By Updated June 3, 2025
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.  

    By June 2, 2025