Strategy: Page 2


  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Bipartisan bill proposes $50M cyber threat analysis program for energy sector

    “Our national security depends on a resilient and secure energy grid,” said Sen. John Hickenlooper, D-Colo. Experts say the new effort would be welcomed by the private sector.

    By Robert Walton • June 5, 2025
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    OlegAlbinsky via Getty Images
    Image attribution tooltip

    Trump’s cyber nominees gain broad industry support

    CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

    By Updated June 3, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.  

    By June 2, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    SentinelOne analysis links service disruption to software flaw

    The outage had major impacts on enterprise customers’ ability to manage security operations, although federal customers were not affected.

    By June 2, 2025
  • close up of a worker holding  up a tablet
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Outage disrupts some SentinelOne services

    Company executives said there was no indication the incident was the result of a security issue.

    By May 29, 2025
  • Group of business people holding a jigsaw puzzle pieces. Business solution integration concept.
    Image attribution tooltip
    courtneyk via Getty Images
    Image attribution tooltip

    Zscaler enters agreement to buy Red Canary

    The agreement allows Red Canary to scale, while helping Zscaler expand into MDR.

    By May 28, 2025
  • A picture of Masimo's headquarters building.
    Image attribution tooltip
    Mario Tama / Staff via Getty Images
    Image attribution tooltip

    Masimo says cyberattack will not prevent it from fulfilling orders

    The maker of patient monitoring devices said the incident will not have a material effect on its updated financial outlook.

    By May 27, 2025
  • A banner bearing the eagle-and-shield logo of the Cybersecurity and Infrastructure Security Agency and reading "America's Cyber Defense Agency" hangs over a conference booth that contains chairs, posters, speakers, and plants.
    Image attribution tooltip
    CISA. (2024). Retrieved from Flickr.
    Image attribution tooltip

    CISA loses nearly all top officials as purge continues

    Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive government-downsizing campaign.

    By May 27, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks beats earnings estimates amid consolidation, AI concerns

    Investors still have concerns about margins as the company uses incentives to drive customers into unified platform deals.

    By May 22, 2025
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.

    By Updated May 21, 2025
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip
    Opinion

    How hospitality companies can stay ahead of cyberattacks this summer

    Hotels are a popular target for cyberattacks, but industry collaboration and intelligence sharing can serve as defense mechanisms.

    By Pam Lindemoen • May 20, 2025
  • Image attribution tooltip
    Lintao Zhang via Getty Images
    Image attribution tooltip

    Researchers warn of China-backed espionage campaign targeting laid-off US workers

    A report by FDD says an elaborate online recruiting effort is using LinkedIn and fake online companies to gather sensitive intelligence.

    By May 20, 2025
  • A woman’s hand is asking an AI chatbot pre-typed questions & the Artificial Intelligence website is answering.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    AI is stirring mixed feelings among CFOs, survey finds

    The research highlights a “trust gap between the untested promise of AI and the wariness of security and privacy risks,” finance software company Kyriba said.

    By Alexei Alexis • May 19, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for extension of cyber info-sharing law

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • A legal technology concept
    Image attribution tooltip
    Dmitry Nogaev via Getty Images
    Image attribution tooltip

    Tennessee’s largest school district sues PowerSchool over data breach

    Memphis-Shelby County Schools’ federal lawsuit against the ed tech giant is among the latest that have been filed by over 100 other districts nationwide.

    By Anna Merod • May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises spent $2M for ransomware recovery

    The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.

    By May 12, 2025
  • The Pentagon, the headquarters of the U.S. Department of Defense in Arlington, Va., is seen from the sky.
    Image attribution tooltip
    Alex Wong/Getty via Getty Images
    Image attribution tooltip

    Defense contractors get a head start on CMMC audits

    Software investments, infrastructure upgrades and compliance documentation topped the list of Cybersecurity Maturity Model Certification implementation costs, a new survey shows.

    By May 12, 2025
  • Beautiful Asian female e-commerce business startup using her mobile phone
    Image attribution tooltip

    stock.adobe.com/bongkarn

    Image attribution tooltip
    Sponsored by Imprivata

    Passwordless authentication: Where security meets productivity

    Say goodbye to password fatigue. Say hello to a more secure, efficient future.

    By Joel Burleson-Davis, Chief Technology Officer, Imprivata • May 12, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    CIOs pay too much for not enough IT security

    Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.

    By Nicole Laskowski • May 9, 2025
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike to cut 500 jobs in plan to scale business

    The cybersecurity firm has faced increasing market pressures amid a scramble by rivals to consolidate enterprise customers on unified platforms.

    By Updated May 8, 2025
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    Airlines in North America prioritize investments in cyber, AI

    Spending plans come amid rising concerns over third-party cyber risk. 

    By May 6, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    DOD plans to fast-track software security reviews

    The Pentagon will lay out new security requirements and approval processes for the software it purchases.

    By May 5, 2025
  • The Honda logo is displayed at the Howdy Honda dealership on March 18, 2024 in Austin, Texas.
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    American Honda steers AI efforts with data governance, quality focus

    The generative AI early adopter has worked to improve data management as it aims for better model accuracy and performance to bolster decision-making. 

    By Lindsey Wilkinson • May 5, 2025