Strategy


  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for cyber info-sharing law extension

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • A legal technology concept
    Image attribution tooltip
    Dmitry Nogaev via Getty Images
    Image attribution tooltip

    Tennessee’s largest school district sues PowerSchool over data breach

    Memphis-Shelby County Schools’ federal lawsuit against the ed tech giant is among the latest that have been filed by over 100 other districts nationwide.

    By Anna Merod • May 16, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises spent $2M for ransomware recovery

    The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.

    By May 12, 2025
  • The Pentagon, the headquarters of the U.S. Department of Defense in Arlington, Va., is seen from the sky.
    Image attribution tooltip
    Alex Wong/Getty via Getty Images
    Image attribution tooltip

    Defense contractors get a head start on CMMC audits

    Software investments, infrastructure upgrades and compliance documentation topped the list of Cybersecurity Maturity Model Certification implementation costs, a new survey shows.

    By May 12, 2025
  • Beautiful Asian female e-commerce business startup using her mobile phone
    Image attribution tooltip

    stock.adobe.com/bongkarn

    Image attribution tooltip
    Sponsored by Imprivata

    Passwordless authentication: Where security meets productivity

    Say goodbye to password fatigue. Say hello to a more secure, efficient future.

    By Joel Burleson-Davis, Chief Technology Officer, Imprivata • May 12, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    CIOs pay too much for not enough IT security

    Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.

    By Nicole Laskowski • May 9, 2025
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike to cut 500 jobs in plan to scale business

    The cybersecurity firm has faced increasing market pressures amid a scramble by rivals to consolidate enterprise customers on unified platforms.

    By Updated May 8, 2025
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    Airlines in North America prioritize investments in cyber, AI

    Spending plans come amid rising concerns over third-party cyber risk. 

    By May 6, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    DOD plans to fast-track software security reviews

    The Pentagon will lay out new security requirements and approval processes for the software it purchases.

    By May 5, 2025
  • The Honda logo is displayed at the Howdy Honda dealership on March 18, 2024 in Austin, Texas.
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    American Honda steers AI efforts with data governance, quality focus

    The generative AI early adopter has worked to improve data management as it aims for better model accuracy and performance to bolster decision-making. 

    By Lindsey Wilkinson • May 5, 2025
  • Salesforce
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Salesforce expands model lineup in support of agentic AI

    The software vendor added variations to its family of large action models for on-device implementation, limited GPU resources and industrial applications.

    By Lindsey Wilkinson • May 2, 2025
  • A view inside the Sphere is seen during Google Cloud Next "25: AI Exclusive at the Sphere" on April 8, 2025 in Las Vegas,
    Image attribution tooltip
    Candice Ward / Stringer via Getty Images
    Image attribution tooltip

    Google pours billions into AI, cyber and infrastructure expansion

    The tech giant's cloud profits more than doubled year over year as it invested more than $17 billion, primarily in servers and data centers.

    By Matt Ashare • May 1, 2025
  • DHS logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Salt Typhoon telecom hacks one of the most consequential campaigns against US ever, expert says

    A prominent former member of a recently shuttered cyber-incident review panel said the board should be reconstituted with independent authority.

    By May 1, 2025
  • Patrick Opet, the global chief information security officer for JPMorgan Chase
    Image attribution tooltip

    JPMorgan Chase

    Image attribution tooltip

    JPMorgan Chase CISO warns software industry on supply chain security

    In an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market. 

    By April 28, 2025
  • Executives working through an AI training course.
    Image attribution tooltip
    Weedezign via Getty Images
    Image attribution tooltip

    AI impact on data breach outcomes remains ‘limited’: Verizon

    While AI-generated text in malicious emails has doubled, the rate of successful phishing breaches is stable.

    By Lindsey Wilkinson • April 23, 2025
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Financial gain still drives majority of cyber threat activity

    Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.

    By April 23, 2025
  • A sign reading "bank" hangs on a building.
    Image attribution tooltip
    assalve via Getty Images
    Image attribution tooltip

    Banks gear up to boost cybersecurity, cloud and data spending

    In the race to scale generative AI capabilities, executives plan to increase foundational technology investments, according to Broadridge.

    By Matt Ashare • April 22, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to build a secure enterprise cloud environment

    There are plenty of frameworks, tools and strategies to help map out a risk-resilient cloud infrastructure.

    By Richard Bartley, Research VP, Gartner • April 21, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder / Stringer via Getty Images
    Image attribution tooltip

    Microsoft strengthens in-house cyber governance, training

    The technology giant, as part of its Secure Future Initiative program, has overhauled security practices following a series of crippling nation-state-linked cyberattacks.

    By April 21, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA launches new wave of job cuts

    Critics warn that drastic downsizing of the DHS unit will threaten the nation’s ability to counter cyber adversaries.

    By April 16, 2025
  • A family stands at a Delta Air Lines ticketing counter trying to rebook a flight after a CrowdStrike software update caused thousands of cancelations.
    Image attribution tooltip
    Jessica McGowan / Stringer via Getty Images
    Image attribution tooltip

    Aviation sector faces heightened cyber risks due to vulnerable software, aging tech

    A report calls on federal authorities to conduct comprehensive risk assessments and take steps to modernize the air traffic control system.

    By April 14, 2025
  • A person holding a laptop in a business suit and standing on a sidewalk
    Image attribution tooltip
    Permission granted by Browse Bravely, Palo Alto Networks
    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Why a secure enterprise browser should be on your security short list in 2025

    Secure enterprise browsers offer a solution to protect all data and users on any device, anywhere, and across all apps. Learn how that could benefit your organization.

    By Anupam Upadhyaya • April 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    CIOs worry about cyber threats, tech talent

    Tech executives grapple with a looming skills gap as they juggle cybersecurity with the speed of innovation, according to an Experis survey.

    By Nicole Laskowski • April 11, 2025
  • Rocket ships with animals going into space
    Image attribution tooltip
    Permission granted by 10k Media
    Image attribution tooltip
    Sponsored by 10k Media

    How AI Agents can help AppSec teams keep up with AI-generated code vulnerabilities

    While AppSec teams are stuck with legacy scanners and backlogs, developers and hackers have adopted AI tools to accelerate their respective objectives.

    By Charlie Klein, Director of Product Marketing, Jit • April 8, 2025