Strategy: Page 2


  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybercrime groups speed up initial access handoff through planning, coordination

    A report by Google Threat Intelligence Group also shows voice-based phishing has surged amid a rise in social engineering tactics.

    By March 24, 2026
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC bans import of consumer-grade routers amid national security concerns

    The decision follows years of escalating attacks against the U.S. from state-linked threat groups targeting routers and edge devices.

    By Updated March 24, 2026
  • a boardroom table surrounded by office chairs Explore the Trendline
    Image attribution tooltip
    IPGGutenbergUKLtd via Getty Images
    Image attribution tooltip
    Trendline

    The Cybersecurity Skills Gap

    From AI to federal budget cuts, the nature of cybersecurity work is changing faster than ever.

    By Cybersecurity Dive staff
  • Three people sit and one person stands on a stage with a backdrop reading "RSAC 2026 Conference"
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    ISACs confront AI’s promise and peril for threat intelligence-sharing

    Any use of AI for ISAC work must preserve members’ trust, representatives of three critical infrastructure sectors said.

    By March 23, 2026
  • A modern industrial building with beige and white walls and large blue-tinted glass windows. The name “Stryker” is mounted in black letters on the upper portion of the building. A white smokestack protrudes from the roof, and the sky is light and partly cloudy.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Stryker confirms cyberattack is contained and restoration underway

    An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm.

    By March 23, 2026
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies know AI is essential for cyber defense but aren’t yet seeing returns

    The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.

    By March 20, 2026
  • Circular clarifier tanks are seen at a water treatment facility
    Image attribution tooltip
    pigphoto/iStock/Getty Images Plus via Getty Images
    Image attribution tooltip

    Water utilities need hands-on cybersecurity help, not just free guidance, pilot program finds

    In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators.

    By March 19, 2026
  • Industrial equipment sits inside a building.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups target cyber-physical systems to disrupt critical infrastructure providers

    The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups.

    By March 18, 2026
  • A person wearing a hoodie sits at a computer in front of a North Korean flag
    Image attribution tooltip
    vchal/iStock /Getty Images Plus via Getty Images
    Image attribution tooltip

    New research unpacks North Korea’s stealthy, sophisticated remote IT worker schemes

    The report recommends that businesses practice several forms of vigilance to avoid unwittingly hiring Pyongyang’s operatives.

    By March 18, 2026
  • National cyber director expands on Trump administration’s vision for AI security, industry collaboration

    The government wants AI firms to embrace security, not see it as a barrier.

    By Updated March 17, 2026
  • person looking up
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    AI agent security: New governance framework shows progress, but critical gaps remain

    New AI security framework shows progress, but seven critical vulnerabilities still need your attention.

    March 16, 2026
  • A worker uses Hexagon's design and engieering technology on his computer.
    Image attribution tooltip
    Courtesy of Hexagon
    Image attribution tooltip

    5 ways to protect manufacturing companies from cyberattacks

    Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.

    By Jeffrey Kinney • March 12, 2026
  • A modern glass and steel building with horizontal lines and a large Google Cloud logo on the corner, featuring reflective windows and power lines crossing in front.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Google completes $32B acquisition of Wiz

    The cloud security specialist will continue to operate under its own brand and across multiple platforms. 

    By March 11, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By March 11, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

    By March 10, 2026
  • Two men wearing suits sit in white chairs on a stage
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration will test infrastructure cybersecurity approaches in pilot program

    The government can’t rely on a “universal solution” to the challenges facing vital services, a top White House official said.

    By March 9, 2026
  • A sign that says "Government Accountability Office" and shows the GAO's seal sits in front of the agency's headquarters
    Image attribution tooltip
    Retrieved from GAO.
    Image attribution tooltip

    Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say

    A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.

    By March 9, 2026
  • A woman seated at a desk, focused on her work at a computer.
    Image attribution tooltip

    Cisco Duo

    Image attribution tooltip
    Sponsored by Cisco Duo

    4 best practices to get IAM implementation right the first time

    Many enterprises are ready to upgrade IAM—a security framework that controls who can access which systems, data, and applications within an organization. Here are the best practices to follow for a successful IAM implementation.

    March 9, 2026
  • Illustration of a raised hand inside a doorway beneath a pink rainbow, surrounded by clouds, stars, a crescent moon, and abstract shapes on a dark purple grid background.
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    How AI will impact security careers and what leaders should do about it

    Security professionals are optimistic about AI’s impact on their careers, but challenges remain.

    By Jennifer Cox, Director of Solutions Engineering, Tines • March 9, 2026
  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

    By March 6, 2026
  • The exterior of the Department Health and Human Services headquarters.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    HHS adds cybersecurity guidance to healthcare sector self-assessment tool

    Organizations can now use the online platform to test their readiness for digital security crises.

    By March 6, 2026
  • Plankey’s nomination as CISA director now in jeopardy

    News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.

    By Updated March 5, 2026
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike reports record quarter amid investor concerns about AI impact

    CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers.

    By March 4, 2026
  • A woman wearing a hijab and sunglasses waves an Iranian flag
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Pro-Russia actors team with Iran-linked hackers in attacks

    The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S. 

    By Updated March 3, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By March 2, 2026
  • future
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    ResOps: The new operating model bridging security, identity and recovery

    Why 77% of enterprises lack AI security practices – and the new operating model bridging the gap.

    March 2, 2026