Strategy


  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks beats earnings estimates amid consolidation, AI concerns

    Investors still have concerns about margins as the company uses incentives to drive customers into unified platform deals.

    By May 22, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.

    By Updated May 21, 2025
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip
    Opinion

    How hospitality companies can stay ahead of cyberattacks this summer

    Hotels are a popular target for cyberattacks, but industry collaboration and intelligence sharing can serve as defense mechanisms.

    By Pam Lindemoen • May 20, 2025
  • Image attribution tooltip
    Lintao Zhang via Getty Images
    Image attribution tooltip

    Researchers warn of China-backed espionage campaign targeting laid-off US workers

    A report by FDD says an elaborate online recruiting effort is using LinkedIn and fake online companies to gather sensitive intelligence.

    By May 20, 2025
  • A woman’s hand is asking an AI chatbot pre-typed questions & the Artificial Intelligence website is answering.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    AI is stirring mixed feelings among CFOs, survey finds

    The research highlights a “trust gap between the untested promise of AI and the wariness of security and privacy risks,” finance software company Kyriba said.

    By Alexei Alexis • May 19, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for extension of cyber info-sharing law

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • A legal technology concept
    Image attribution tooltip
    Dmitry Nogaev via Getty Images
    Image attribution tooltip

    Tennessee’s largest school district sues PowerSchool over data breach

    Memphis-Shelby County Schools’ federal lawsuit against the ed tech giant is among the latest that have been filed by over 100 other districts nationwide.

    By Anna Merod • May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises spent $2M for ransomware recovery

    The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.

    By May 12, 2025
  • The Pentagon, the headquarters of the U.S. Department of Defense in Arlington, Va., is seen from the sky.
    Image attribution tooltip
    Alex Wong/Getty via Getty Images
    Image attribution tooltip

    Defense contractors get a head start on CMMC audits

    Software investments, infrastructure upgrades and compliance documentation topped the list of Cybersecurity Maturity Model Certification implementation costs, a new survey shows.

    By May 12, 2025
  • Beautiful Asian female e-commerce business startup using her mobile phone
    Image attribution tooltip

    stock.adobe.com/bongkarn

    Image attribution tooltip
    Sponsored by Imprivata

    Passwordless authentication: Where security meets productivity

    Say goodbye to password fatigue. Say hello to a more secure, efficient future.

    By Joel Burleson-Davis, Chief Technology Officer, Imprivata • May 12, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    CIOs pay too much for not enough IT security

    Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.

    By Nicole Laskowski • May 9, 2025
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike to cut 500 jobs in plan to scale business

    The cybersecurity firm has faced increasing market pressures amid a scramble by rivals to consolidate enterprise customers on unified platforms.

    By Updated May 8, 2025
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    Airlines in North America prioritize investments in cyber, AI

    Spending plans come amid rising concerns over third-party cyber risk. 

    By May 6, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    DOD plans to fast-track software security reviews

    The Pentagon will lay out new security requirements and approval processes for the software it purchases.

    By May 5, 2025
  • The Honda logo is displayed at the Howdy Honda dealership on March 18, 2024 in Austin, Texas.
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    American Honda steers AI efforts with data governance, quality focus

    The generative AI early adopter has worked to improve data management as it aims for better model accuracy and performance to bolster decision-making. 

    By Lindsey Wilkinson • May 5, 2025
  • Salesforce
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Salesforce expands model lineup in support of agentic AI

    The software vendor added variations to its family of large action models for on-device implementation, limited GPU resources and industrial applications.

    By Lindsey Wilkinson • May 2, 2025
  • A view inside the Sphere is seen during Google Cloud Next "25: AI Exclusive at the Sphere" on April 8, 2025 in Las Vegas,
    Image attribution tooltip
    Candice Ward / Stringer via Getty Images
    Image attribution tooltip

    Google pours billions into AI, cyber and infrastructure expansion

    The tech giant's cloud profits more than doubled year over year as it invested more than $17 billion, primarily in servers and data centers.

    By Matt Ashare • May 1, 2025
  • DHS logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Salt Typhoon telecom hacks one of the most consequential campaigns against US ever, expert says

    A prominent former member of a recently shuttered cyber-incident review panel said the board should be reconstituted with independent authority.

    By May 1, 2025
  • Patrick Opet, the global chief information security officer for JPMorgan Chase
    Image attribution tooltip

    JPMorgan Chase

    Image attribution tooltip

    JPMorgan Chase CISO warns software industry on supply chain security

    In an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market. 

    By April 28, 2025
  • Executives working through an AI training course.
    Image attribution tooltip
    Weedezign via Getty Images
    Image attribution tooltip

    AI impact on data breach outcomes remains ‘limited’: Verizon

    While AI-generated text in malicious emails has doubled, the rate of successful phishing breaches is stable.

    By Lindsey Wilkinson • April 23, 2025
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    LuisPortugal/Getty Images Plus via Getty Images
    Image attribution tooltip

    Financial gain still drives majority of cyber threat activity

    Stolen credentials are becoming a more prevalent form of initial access, a report from Mandiant shows.

    By April 23, 2025
  • A sign reading "bank" hangs on a building.
    Image attribution tooltip
    assalve via Getty Images
    Image attribution tooltip

    Banks gear up to boost cybersecurity, cloud and data spending

    In the race to scale generative AI capabilities, executives plan to increase foundational technology investments, according to Broadridge.

    By Matt Ashare • April 22, 2025
  • Cloud Network Solution digital background. Cyber Security and Cloud Technology Concept
    Image attribution tooltip
    da-kuk via Getty Images
    Image attribution tooltip
    Opinion

    Gartner: How to build a secure enterprise cloud environment

    There are plenty of frameworks, tools and strategies to help map out a risk-resilient cloud infrastructure.

    By Richard Bartley, Research VP, Gartner • April 21, 2025