Strategy: Page 2
-
Cybercrime groups speed up initial access handoff through planning, coordination
A report by Google Threat Intelligence Group also shows voice-based phishing has surged amid a rise in social engineering tactics.
By David Jones • March 24, 2026 -
FCC bans import of consumer-grade routers amid national security concerns
The decision follows years of escalating attacks against the U.S. from state-linked threat groups targeting routers and edge devices.
By David Jones • Updated March 24, 2026 -
Explore the Trendline➔
IPGGutenbergUKLtd via Getty Images
TrendlineThe Cybersecurity Skills Gap
From AI to federal budget cuts, the nature of cybersecurity work is changing faster than ever.
By Cybersecurity Dive staff -
ISACs confront AI’s promise and peril for threat intelligence-sharing
Any use of AI for ISAC work must preserve members’ trust, representatives of three critical infrastructure sectors said.
By Eric Geller • March 23, 2026 -
Stryker confirms cyberattack is contained and restoration underway
An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm.
By David Jones • March 23, 2026 -
Companies know AI is essential for cyber defense but aren’t yet seeing returns
The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.
By Eric Geller • March 20, 2026 -
Water utilities need hands-on cybersecurity help, not just free guidance, pilot program finds
In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators.
By Eric Geller • March 19, 2026 -
Threat groups target cyber-physical systems to disrupt critical infrastructure providers
The Iran war has raised concerns that key industrial sectors could be the target of hacktivists, state actors and other groups.
By David Jones • March 18, 2026 -
New research unpacks North Korea’s stealthy, sophisticated remote IT worker schemes
The report recommends that businesses practice several forms of vigilance to avoid unwittingly hiring Pyongyang’s operatives.
By Eric Geller • March 18, 2026 -
National cyber director expands on Trump administration’s vision for AI security, industry collaboration
The government wants AI firms to embrace security, not see it as a barrier.
By Eric Geller • Updated March 17, 2026 -
Sponsored by Commvault
AI agent security: New governance framework shows progress, but critical gaps remain
New AI security framework shows progress, but seven critical vulnerabilities still need your attention.
March 16, 2026 -
5 ways to protect manufacturing companies from cyberattacks
Manufacturing suffered the most cyberattacks of any industry last year. Experts have advice about hardening networks and avoiding common mistakes.
By Jeffrey Kinney • March 12, 2026 -
Google completes $32B acquisition of Wiz
The cloud security specialist will continue to operate under its own brand and across multiple platforms.
By David Jones • March 11, 2026 -
R. Eskalis/NIST. Retrieved from NIST.
Industry to NIST: Keep agentic AI standards flexible and voluntary
The business community said security guidance should reflect the nascency and diversity of the field.
By Eric Geller • March 11, 2026 -
US entities face heightened cyber risk related to Iran war
The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.
By David Jones • March 10, 2026 -
Trump administration will test infrastructure cybersecurity approaches in pilot program
The government can’t rely on a “universal solution” to the challenges facing vital services, a top White House official said.
By Eric Geller • March 9, 2026 -
Retrieved from GAO.
Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say
A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.
By Eric Geller • March 9, 2026 -
Sponsored by Cisco Duo
4 best practices to get IAM implementation right the first time
Many enterprises are ready to upgrade IAM—a security framework that controls who can access which systems, data, and applications within an organization. Here are the best practices to follow for a successful IAM implementation.
March 9, 2026 -
Sponsored by Tines
How AI will impact security careers and what leaders should do about it
Security professionals are optimistic about AI’s impact on their careers, but challenges remain.
By Jennifer Cox, Director of Solutions Engineering, Tines • March 9, 2026 -
Trump’s new cybersecurity strategy makes promises but lacks details
In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.
By Eric Geller • March 6, 2026 -
HHS adds cybersecurity guidance to healthcare sector self-assessment tool
Organizations can now use the online platform to test their readiness for digital security crises.
By Eric Geller • March 6, 2026 -
Retrieved from Senate Homeland Security Committee.
Plankey’s nomination as CISA director now in jeopardy
News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.
By Eric Geller • Updated March 5, 2026 -
CrowdStrike reports record quarter amid investor concerns about AI impact
CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers.
By David Jones • March 4, 2026 -
Pro-Russia actors team with Iran-linked hackers in attacks
The groups formed a loose alliance in recent days, targeting critical infrastructure in the Middle East and the U.S.
By David Jones • Updated March 3, 2026 -
Deep Dive
How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.
By Eric Geller • March 2, 2026 -
Sponsored by Commvault
ResOps: The new operating model bridging security, identity and recovery
Why 77% of enterprises lack AI security practices – and the new operating model bridging the gap.
March 2, 2026