Leadership & Careers


  • A medical team takes a patient into the isolation ward in the emergency department of a full-service acute hospital facility.
    Image attribution tooltip
    Lisa Maree Williams via Getty Images
    Image attribution tooltip

    Risk management, legacy tech pose major threats to healthcare firms, report finds

    Companies have improved their recovery processes and user controls but still lag in risk preparedness, according to the report.

    By July 15, 2025
  • Longworth Congressional Building
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Security coalition urges Congress to renew 2015 CISA law

    A group of top cybersecurity and technology firms said the law provided critical protections for sharing essential vulnerability information.

    By July 8, 2025
  • 3D digital circular dynamic wave. Explore the Trendline
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip
    Trendline

    CISO Strategy

    Corporate stakeholders want to better understand the risk calculus of their technology stacks, answering the lingering question: Are we a target? 

    By Cybersecurity Dive staff
  • Sen Ron Wyden sits behind a wooden podium with a microphone.
    Image attribution tooltip
    Sarah Silbiger / Stringer via Getty Images
    Image attribution tooltip

    FBI cyber guidance to lawmakers falls short, US senator says

    Sen. Ron Wyden wants FBI briefings to cover four often-overlooked cybersecurity practices.

    By July 2, 2025
  • cybersecurity graphic
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    Beyond the hype: How security leaders can build AI agents that matter

    AI agents can reclaim hours of lost analyst time if deployed with purpose, strategy and secure design.

    By Eoin Hinchy, CEO & Co-Founder, Tines • June 30, 2025
  • Brain Artificial Intelligence Chip
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    AI security issues dominate corporate worries, spending

    Two reports illustrate how business leaders are thinking about and budgeting for generative AI.

    By June 26, 2025
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    ‘Suspended animation’: US government upheaval has frayed partnerships with critical infrastructure

    Recent federal cuts, reorganizations and other disruptions have alarmed industry leaders, who say the government is a less reliable partner even as cyber threats increase.

    By June 25, 2025
  • Amy Herzog on stage speaking during a conference
    Image attribution tooltip
    Permission granted by AWS
    Image attribution tooltip

    AWS CISO stumps for security as an AI enabler

    AI’s rapid development underscores the need for secure foundations, Amy Herzog said Tuesday during the company’s annual cybersecurity conference.

    By Roberto Torres • June 20, 2025
  • an executive in business attire
    Image attribution tooltip
    simon2579 via Getty Images
    Image attribution tooltip

    Cyberattacks top list of global business concerns, Kroll finds

    Many companies feel unprepared to comply with global privacy and security rules, according to the advisory firm’s annual business sentiment survey.

    By June 13, 2025
  • President Donald Trump waves to a crowd at the White House on April 2, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump scraps Biden software security, AI, post-quantum encryption efforts in new executive order

    The White House accused the Biden administration of trying to “sneak problematic and distracting issues into cybersecurity policy.” 

    By June 6, 2025
  • Deep fake
    Image attribution tooltip
    wildpixel via Getty Images
    Image attribution tooltip

    Corporate executives face mounting digital threats as AI drives impersonation

    Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces.

    By June 6, 2025
  • Sean Cairncross stands on a stage in front of two microphones
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Trump’s national cyber director nominee dodges criticism of funding cuts

    Sean Cairncross said his managerial experience has prepared him well to lead a relatively new White House cyber unit.

    By June 5, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA workforce cut by nearly one-third so far

    The agency has lost roughly 1,000 staffers in the wake of the Trump administration’s workforce cuts, losses that could imperil its ability to protect government computer systems and critical infrastructure.

    By June 4, 2025
  • View of the White House with flowers and fountain in front.
    Image attribution tooltip
    OlegAlbinsky via Getty Images
    Image attribution tooltip

    Trump’s cyber nominees gain broad industry support

    CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

    By Updated June 3, 2025
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    Trump’s CISA budget lays out deep job cuts, program reductions

    Critical infrastructure organizations and small businesses would get less support under the president’s fiscal 2026 funding plan.

    By Updated June 2, 2025
  • Rows of people sit at tables with name cards in front of each of them. The two people in the foreground look at each other as they converse.
    Image attribution tooltip
    Phoenix, Sydney. Retrieved from U.S. Department of Homeland Security.
    Image attribution tooltip

    Senate Democrats urge DHS to reconstitute CSRB

    The lawmakers said the Cyber Safety Review Board’s work has made government agencies and private businesses more secure.

    By May 30, 2025
  • A banner bearing the eagle-and-shield logo of the Cybersecurity and Infrastructure Security Agency and reading "America's Cyber Defense Agency" hangs over a conference booth that contains chairs, posters, speakers, and plants.
    Image attribution tooltip
    CISA. (2024). Retrieved from Flickr.
    Image attribution tooltip

    CISA loses nearly all top officials as purge continues

    Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive government-downsizing campaign.

    By May 27, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks beats earnings estimates amid consolidation, AI concerns

    Investors still have concerns about margins as the company uses incentives to drive customers into unified platform deals.

    By May 22, 2025
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.

    By Updated May 21, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    High-profile CISA departure adds to agency’s struggles

    The Trump administration’s workforce purge is sapping CISA of its best talent, experts say. CISA deputy Matt Hartman is the latest to leave the agency.

    By May 20, 2025
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip
    Opinion

    How hospitality companies can stay ahead of cyberattacks this summer

    Hotels are a popular target for cyberattacks, but industry collaboration and intelligence sharing can serve as defense mechanisms.

    By Pam Lindemoen • May 20, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Major tech vendors call for streamlining US foreign cyber aid

    A new coalition will push policymakers to change how the government oversees foreign purchases of U.S. cyber resources.

    By Updated May 21, 2025
  • A woman’s hand is asking an AI chatbot pre-typed questions & the Artificial Intelligence website is answering.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    AI is stirring mixed feelings among CFOs, survey finds

    The research highlights a “trust gap between the untested promise of AI and the wariness of security and privacy risks,” finance software company Kyriba said.

    By Alexei Alexis • May 19, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for extension of cyber info-sharing law

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • FBI seal displayed on a wall
    Image attribution tooltip
    Chip Somodevilla/Getty Images via Getty Images
    Image attribution tooltip

    FBI warns senior US officials are being impersonated using texts, AI-based voice cloning

    Hackers are increasingly using vishing and smishing for state-backed espionage campaigns and major ransomware attacks.

    By May 16, 2025
  • Longworth Congressional Building
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Congress faces pressure to renew cyber information-sharing law

    The law’s expiration in September could jeopardize a wide range of information-sharing partnerships that have helped catch and thwart cyberattacks in the U.S.

    By May 14, 2025