Strategy: Page 3


  • App icons for generative AI assistants OpenAI ChatGPT, Google Gemini, Anthropic Claude, DeepSeek, Meta AI and xAI Grok are pictured on a smartphone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Data security gaps stymy enterprise AI plans

    Nearly three-quarters of CIOs and CISOs see information complexity as an adoption roadblock.

    By Matt Ashare • Sept. 8, 2025
  • The exterior of a Marriott hotel is seen on February 11, 2025 in Miami, Florida.
    Image attribution tooltip
    Joe Raedle / Staff via Getty Images
    Image attribution tooltip

    Marriott checks out AI agents amid technology transformation

    The multinational hospitality giant is building a model-agnostic chassis featuring an agentic layer.

    By Lindsey Wilkinson • Sept. 5, 2025
  • Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Data privacy, cyber insurance
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Swiss Re warns of rate deterioration in cyber insurance

    Competition among insurers has forced them to offer concessions on premiums, limits and controls.

    By Sept. 5, 2025
  • Vegetables sit on grocery store shelves
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip
    Deep Dive

    How the newest ISAC aims to help food and agriculture firms thwart cyberattacks

    Food industry executives used to shrug off ransomware and cyber-espionage risks. A threat intel group is helping to change that, but its reach remains unclear.

    By Sept. 4, 2025
  • a screenshot of a virtual conversation between two panelists and a moderator in business attire
    Image attribution tooltip
    Roberto Torres/Cybersecurity Dive
    Image attribution tooltip

    How Tampa General Hospital worked to quantify cyber risk

    The medical center’s CIO and CISO teamed up to translate security decisions into dollars and cents.

    By Matt Ashare • Sept. 3, 2025
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip
    Deep Dive

    FCC investigation could derail its own IoT security certification program

    Internet of Things device makers are eager to participate, but the commission’s concerns about its lead administrator have halted progress of the U.S. Cyber Trust Mark program.

    By Sept. 2, 2025
  • An artificial intelligence processor unit
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Safety-critical industries wary about using AI for cybersecurity

    Finance, tech and professional services are among the sectors with the widest adoption of AI-based security tools, according to a new report.

    By Aug. 27, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs grow more concerned about risk of material cyberattack

    A report by Proofpoint shows growing anxiety among security leaders about their companies’ cyber readiness.

    By Aug. 26, 2025
  • A digital blue fingerprint lifted being lifted off a mirrored surface against a black background. Binary code makes up the fingerprint.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Execs worry about unknown identity-security weaknesses

    Credential theft attacks prove that companies need to do better, but business leaders cited many reasons for slow progress.

    By Aug. 26, 2025
  • Two colleagues have a discussion at an office desk as one points to a laptop screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT, business leaders clash over cloud, data security

    Executives plan to increase IT spend despite disappointing returns on tech investments, according to Unisys.

    By Matt Ashare • Aug. 25, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates SBOM recommendations

    The document is primarily meant for federal agencies, but CISA hopes businesses will also use it to push vendors for software bills of materials.

    By Aug. 22, 2025
  • Magnifying glass with business report on financial advisor desk.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber, AI drive software spending to double-digit growth through 2029

    Cloud security and identity and access management tool purchases insulated the market from tariff-induced economic shocks, according to Forrester.

    By Matt Ashare • Aug. 21, 2025
  • Beige and blue modern office building with large windows and the “paloalto networks” logo in black and red near the top corners.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Palo Alto Networks shares surge after company releases strong annual forecast

    The cybersecurity firm said its “platformization” strategy is beginning to pay dividends as more large customers consolidate their spending on its offerings.

    By Aug. 19, 2025
  • A group of employees attend a hybrid attendance presentation from a small meeting room.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Execs use responsible AI to drive growth, prevent risks

    Business leaders want to prevent further fallout as nearly all have experienced at least one problematic incident tied to AI, according to an Infosys survey.

    By Lindsey Wilkinson • Aug. 19, 2025
  • Brightly colored digital lock with central computer processor and futuristic circuit board.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Businesses focus on AI, cloud, despite cyber defense oversights

    Recent surveys found enterprises are enthusiastically adopting AI, even as they neglect basic cybersecurity measures.

    By Aug. 19, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    NIST seeks input on control overlays for securing AI systems

    The federal agency plans to develop guidance to organizations about various AI use cases.

    By Aug. 18, 2025
  • Futuristic electronic semiconductor and telecommunication network concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity ranks among top three risks to manufacturing sector

    Most companies are planning major AI investments to address growing threats to OT systems.

    By Aug. 15, 2025
  • An aerial view shows large pools of water at a wastewater treatment plant
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Water sector expands partnership with volunteer hackers

    As threats to critical infrastructure grow and government funding stagnates, operators are turning to civic-minded volunteers from the cybersecurity industry.

    By Aug. 14, 2025
  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration cyber cuts eroding private sector’s trust, confidence

    A report by Swimlane shows companies are reducing cybersecurity spending and security teams are experiencing increasing pressure.

    By Updated Aug. 14, 2025
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    White House urged to revamp cyber regulations

    A leading trade group said the Trump administration should rein in a major pending cybersecurity rule as well as embrace AI-based cyber defenses.

    By Aug. 14, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, Microsoft update guidance on Exchange Server vulnerability

    Officials reiterated their belief that hackers were not exploiting the flaw, but nonetheless urged users to immediately check their systems.

    By Aug. 13, 2025
  • IT expert using digital tablet to operate network servers.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    US agencies, international allies issue guidance on OT asset inventorying

    The guidance includes specific examples for three critical infrastructure sectors that held workshops with CISA.

    By Aug. 13, 2025
  • nucor-eaf
    Image attribution tooltip
    Courtesy of Nucor
    Image attribution tooltip

    Financial impact from severe OT events could top $300B

    A report from industrial cybersecurity firm Dragos highlights growing risks of business interruption and supply-chain disruptions.

    By Aug. 12, 2025
  • A massive electronic screen that says "DEF CON 2025" and "HUMAN 33" hangs in a large atrium.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Cyber experts ponder a non-government future for the CVE program

    Organizations supporting the security vulnerability program said it needed changes to improve stability and rebuild trust.

    By Aug. 11, 2025
  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    DARPA touts value of AI-powered vulnerability detection as it announces competition winners

    The U.S. military research agency hopes to foster a new ecosystem of autonomous vulnerability remediation.

    By Aug. 8, 2025