Strategy: Page 2


  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Landmark US cyber-information-sharing program expires, bringing uncertainty

    Without legal protections, companies might stop reporting information about cybersecurity threats.

    By Oct. 1, 2025
  • A jet flying in the sky.
    Image attribution tooltip

    Courtesy of GKN Aerospace.

    Image attribution tooltip

    CMMC is coming, but most contractors still have a long road to full compliance

    A new survey illustrates the defense industrial base’s fragmented security posture.

    By Oct. 1, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover to resume some manufacturing within days

    The U.K. will support a $2 billion loan guarantee to help restore the automaker’s supply chain after a cyberattack disrupted production.

    By Sept. 29, 2025
  • Businessman with protective hands gesture and insurance icons.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber insurance could greatly reduce losses from diversification, mitigation measures

    A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and improving cyber hygiene.

    By Sept. 25, 2025
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges dependency checks following Shai-Hulud compromise

    Security teams are urged to review their software environments after a major supply chain attack on the NPM ecosystem.

    By Sept. 24, 2025
  • Stressed IT professional works late at night in a datacenter.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Many ‘material’ cybersecurity breaches go unreported: VikingCloud

    The research also found that cyberattacks have escalated both in frequency and severity in the past year, with AI serving as a primary driver behind the surge.

    By Alexei Alexis • Sept. 23, 2025
  • Vehicles are checked before moving to the next stage of production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. The company paused production following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Jaguar Land Rover to extend production pause into October following cyberattack

    Meanwhile, Stellantis said hackers gained access to some customer information in a third-party data breach.

    By Sept. 23, 2025
  • The letters AI on a digital block
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-powered vulnerability detection will make things worse, not better, former US cyber official warns

    Patching won’t be able to keep up with discovery, said Rob Joyce, who once led the National Security Agency's elite hacking team.

    By Sept. 22, 2025
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Preemptive security predicted to constitute about half of IT security spending by 2030

    The increasing use of AI will drive a demand for technology that can anticipate and neutralize threats, Gartner said in a new report.

    By Sept. 19, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST explains how post-quantum cryptography push overlaps with existing security guidance

    The agency published a document linking its recommendations for PQC migration to the advice in its landmark security publications.

    By Sept. 19, 2025
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Evolving AI attacks, rapid model adoption worry cyber defenders

    IT defenders think many of their security tools aren’t ready for AI-powered cyberattacks, according to a new report.

    By Sept. 19, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft disrupts global phishing campaign that led to widespread credential theft

    Officials say the operation led to ransomware and BEC attacks on U.S. hospitals and healthcare organizations.

    By Sept. 17, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Context is key in a world of identity-based attacks and alert fatigue

    A new report highlights why businesses struggle to separate true cyber threats from false positives.

    By Sept. 16, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Schools are getting better at navigating ransomware attacks, Sophos finds

    In 2025, 67% of global lower education providers said they stopped an attack before their stolen data was encrypted, the cybersecurity company reported.

    By Anna Merod • Sept. 16, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA audit sparks debate about cybersecurity pay incentives

    Some Cybersecurity and Infrastructure Security Agency employees believe a recent inspector general’s report partially missed the mark.

    By Sept. 15, 2025
  • The Salesforce cloud logo is pictured on the software company's headquarters in New York on Aug. 18, 2022.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FBI warns about 2 campaigns targeting Salesforce instances

    The threat groups, identified as UNC6040 and UNC6395, have used different tactics to gain access to data.

    By Sept. 15, 2025
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    CISA pledges robust support for funding, further development of CVE program

    A key official from the agency said the vulnerability management program will continue with additional participation and enhancements.

    By Sept. 12, 2025
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn VoidProxy phishing platform can bypass MFA

    The service has been targeting Microsoft and Google accounts for months, opening the door to possible BEC attacks and data exfiltration.

    By Sept. 12, 2025
  • A person in business attire speaks while holding a card, with a blue background displaying the words "Billington Cybersecurity" in a tiled pattern.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    UK cyber leader calls for shift in focus toward continuity of critical services

    Richard Horne, CEO of the National Cyber Security Centre, said the U.S. remains a key ally in the global fight against sophisticated adversaries.

    By Sept. 11, 2025
  • Shoes sit on display tables and shelves in a store
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip
    Deep Dive

    How the retail sector teams up to defend against cybercrime

    The cyberthreat intel-sharing and collaboration group RH-ISAC is helping companies confront cyberattacks. But the challenge is delivering timely intelligence in a dynamic threat environment.

    By Sept. 11, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Senior NSC official said US needs to embrace offensive cyber

    Alexei Bulazel said the administration is unapologetically in favor of using offensive capabilities to deter the nation’s adversaries. 

    By Sept. 10, 2025
  • A man faces multiple computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware insurance losses spike despite fewer claims: Resilience

    AI-powered phishing, “double extortion” tactics and insurance policy theft are fueling more destructive, costly ransomware attacks, the cybersecurity firm said.

    By Alexei Alexis • Sept. 10, 2025
  • National Cyber Director Sean Cairncross delivers keynote address at the Billington CyberSecurity Summit on Sept. 9, 2025.
    Image attribution tooltip
    Permission granted by Billington
    Image attribution tooltip

    National cyber director says US must shift risk burden toward adversaries

    In his first major address after confirmation, Sean Cairncross said the U.S. needs to take bold, coordinated steps to counter authoritarian rivals.

    By Sept. 10, 2025
  • cybersecurity stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B

    The agreement is part of a larger strategy for Mitsubishi to develop one-stop security capabilities in the OT space.

    By Sept. 9, 2025
  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How AI and politics hampered the secure open-source software movement

    Tech giants pledged millions to secure open-source code. Then AI came along.

    By Sept. 9, 2025