Strategy


  • Person staring at code wall
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI vs. AI: Why cybersecurity’s new front line is behavioral intelligence

     Behavioral analytics and automation in the age of AI-driven cyber attacks.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Feb. 23, 2026
  • United States Treasury Department
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US Treasury Department offers secure AI advice to financial services firms

    The agency developed the resources in partnership with financial executives and other regulators.

    By Feb. 20, 2026
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks CEO sees AI as demand driver, not a threat

    During a quarterly investor call, Nikesh Arora addressed growing concerns in the investment community that AI could hurt demand for cybersecurity.

    By Updated Feb. 19, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Feb. 19, 2026
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity and supply chain need more attention, risk intelligence firm says

    Roughly a third of attacks now use stolen credentials, according to the company’s latest report.

    By Feb. 18, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

    By Feb. 18, 2026
  • mechanical gears and circuits
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    New security research finds governance determines trust in AI

    As AI adoption deepens, governance determines whether security teams can trust it.

    By Niall Heffernan, Staff GRC Analyst, Tines • Feb. 17, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA will shutter some missions to prioritize others

    The agency has lost roughly one-third of its workforce since January 2025.

    By Updated Feb. 13, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Microsoft prepares to refresh Secure Boot’s digital certificate

    Some customers, including in critical infrastructure sectors, will need to manually review their devices’ readiness for the update.

    By Feb. 10, 2026
  • Solar panels and wind turbines in a desert landscape.
    Image attribution tooltip
    Mario Tama via Getty Images
    Image attribution tooltip

    Polish power grid hack offers lessons for critical infrastructure operators, CISA says

    The agency listed several steps businesses could take to prevent similar cyberattacks.

    By Feb. 10, 2026
  • One of the entrances to the Federal Trade Commission Building in Washington, DC, that serves as the headquarters of the Federal Trade Commission (FTC).
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    FTC data highlights online threats to consumers and businesses

    The commission listed several steps companies can take to fend off attacks.

    By Feb. 9, 2026
  • Illustration of five overlapping circles with stars transitioning to a sun, clouds, and hills. Set against a purple grid background with floating geometric shapes.
    Image attribution tooltip

    Tines

    Image attribution tooltip
    Sponsored by Tines

    New research: 3 big challenges facing security teams (and how to overcome them)

    New research from Tines shows AI adoption is high, but manual workloads and burnout persist.

    By Jennifer Cox, Director of Solutions Engineering, Tines • Feb. 9, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • Two men and a woman sit on an event stage in front of a blue backdrop that displays the name of the event and its organizer
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    AI-ISAC inches forward under Trump administration

    The U.S. government is exploring different options for how the information-sharing organization should work, an official said.

    By Feb. 3, 2026
  • Two men sit on a stage in front of a blue backdrop bearing the logos of a conference and its sponsors
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    National cyber director solicits industry help in fixing regulations, threat information-sharing

    President Donald Trump’s chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects.

    By Feb. 3, 2026
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    National cybersecurity strategies depend on public-private trust, report warns

    An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans.

    By Feb. 3, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • A project engineer talks to a computer operator who points to screens showing AI and machine learning enhanced tools.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Q&A

    How Granite complied with new federal cyber regs before a critical deadline

    To reach Cybersecurity Maturity Model Certification Level 2, CTO Malcolm Jack learned implementation was as much about people as it was the technology.

    By Matthew Thibault • Jan. 30, 2026
  • Jaguar Land Rover Assembly Line for at Halewood in the U.K.
    Image attribution tooltip
    Courtesy of Jaguar Land Rover
    Image attribution tooltip
    Deep Dive

    Manufacturers fortify cyber defenses in response to dramatic surge in attacks

    IT/OT convergence and other trends are making the manufacturing industry’s networks more vulnerable and more frequently targeted, but sector leaders are working to improve their cyber posture.

    By , Jan. 29, 2026
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

    By Jan. 28, 2026
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    By Updated Jan. 28, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Jan. 28, 2026