Deep Dive

Industry insights from our journalists


  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip

    CIOs turn to NIST to tackle generative AI’s many risks

    Discover's CIO is one of many tech leaders working to limit generative AI missteps by turning to risk management frameworks to get deployment right from the outset.

    Lindsey Wilkinson • Oct. 9, 2024
  • Are cybersecurity professionals OK?

    Absorbing the impacts of cyberattacks takes a personal toll on defenders. Separating the evil they see from all that’s good in the world doesn’t always come easy.

    Matt Kapko • Aug. 7, 2024
  • CEO Satya Nadella of Microsoft pictured on stage with the Microsoft logo in the background.
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    At Microsoft, years of security debt come crashing down

    Critics say negligence, misguided investments and hubris have left the enterprise giant on its back foot.

    David Jones • April 30, 2024
  • Aerial view of Colorado State University campus.
    Image attribution tooltip
    Retrieved from Colorado State University on January 09, 2024
    Image attribution tooltip

    Progress Software’s MOVEit meltdown: uncovering the fallout

    Businesses use the file-transfer service because it checks the compliance boxes for keeping data safe. Though initial attacks were targeted, thousands of bystanding businesses were hit indiscriminately.

    Matt Kapko and Julia Himmel • Jan. 16, 2024
  • Sand slipping through hands cupped together.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Security has an underlying defect: passwords and authentication

    Cyberattacks are fueled by the shortcomings of business authentication controls. Bad things happen when access falls apart and credentials land in the wrong hands.

    Matt Kapko • Sept. 18, 2023
  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    MOVEit mass exploit timeline: How the file-transfer service attacks entangled victims

    The slow-moving disaster has ensnared some of the world's largest enterprises. Cybersecurity experts expect further damage to come.

    Matt Kapko • July 14, 2023
  • An illustration of personal info cards passing through a medical cross shape opening in a person's chest.
    Image attribution tooltip

    Illustration: Yann Bastard for Industry Dive 

    Image attribution tooltip

    Hacking healthcare: With 385M patient records exposed, cybersecurity experts sound alarm on breach surge

    Healthcare companies must harden their defenses, but it may require regulators and lawmakers to raise the bar on security standards, experts say.

    Jasmine Ye Han • March 10, 2023
  • Man sits in an office with technical instruments in the background.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip

    A first-hand look inside Walmart’s robust security operations

    The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart’s operations speaks to the lengths enterprises must go to remain secure. 

    Naomi Eide • Jan. 30, 2023
  • Bright AWS signage hangs over a trade show floor, attendees walking by in the foreground
    Image attribution tooltip
    Noah Berger/Getty Images for Amazon Web Services via Getty Images
    Image attribution tooltip

    Where is AWS in the cybersecurity conversation?

    The cloud leader doesn’t emphasize security and share information at the same level as its competitors. Experts say that's by design.

    Matt Kapko • Nov. 29, 2022
  • An illustration of a hospital and a medical corporate building pieced together like a puzzle.
    Image attribution tooltip

    Illustration: Xavier Lalanne-Tauzia for Industry Dive

    Image attribution tooltip

    After the CommonSpirit ransomware attack: Why healthcare M&A is a ‘huge’ cybersecurity risk

    The security incident comes three years after the health system’s megamerger, which potentially made it vulnerable to an attack, security experts say.

    Samantha Liss • Oct. 27, 2022
  • Three pathways for hackers to crash the US power grid
    Image attribution tooltip
    Adeline Kon/Cybersecurity Dive
    Image attribution tooltip

    Hackers could crash the US power grid, but money, not sabotage, is their focus

    For now, the capability remains in the hands of nation-state actors. But "sophistication can ultimately be bought," Edison Electric Institute's Scott Aaronson said.

    Robert Walton • Nov. 2, 2021
  • Image attribution tooltip
    Sarah Silbiger via Getty Images
    Image attribution tooltip

    What's under the hood of a medical device? Software bill of materials hits inflection point

    President Joe Biden's executive order calls for SBOMs, and the FDA wants to require premarket submissions to have an inventory of third-party device components. AdvaMed is concerned the data could be exploited by hackers.

    Greg Slabodkin • Oct. 11, 2021
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft, under attack from threat actors, positions itself as cyber guardian

    The pandemic created more business opportunity, but malicious actors dogged the company's technology stack. Now, the very same products touted as security defense tools are under fire. 

    David Jones • Sept. 29, 2021
  • Legacy medical devices, growing hacker threats create perfect storm of cybersecurity risks

    Hospitals are using more connected devices, many of which were not built with cybersecurity in mind, leaving healthcare organizations highly vulnerable to attacks.

    Greg Slabodkin • June 23, 2021
  • marijuana, computers, hiring
    Image attribution tooltip
    Adeline Kon for Cybersecurity Dive/Cybersecurity Dive
    Image attribution tooltip

    Marijuana is becoming more accepted. Will cybersecurity employers play along?

    As more states legalize recreational use, employers in the public and private sectors may need to change how they hire for cybersecurity.

    Samantha Schwartz • April 20, 2021
  • A still of COVID-19 vaccine vials from Johnson & Johnson going through production
    Image attribution tooltip
    Permission granted by Johnson & Johnson
    Image attribution tooltip

    4 tools to fight fraud, counterfeits and cyberattacks in the COVID-19 vaccine supply chain

    Visibility technologies and real-time data provide one version of the truth in a rapidly built supply chain.

    Deborah Abrams Kaplan • April 7, 2021
  • Image attribution tooltip
    Danielle Ternes for CIO Dive
    Image attribution tooltip

    Ransomware 2020: the scale, scope and impact of attacks on business

    In an international health crisis ripe with economic volatility, ransomware attacks have remained persistent. The fallout is growing more costly.

    Samantha Schwartz • Oct. 30, 2020
  • 'Golden bullet' clauses protect CISOs after a breach

    A financial cushion will not shield an executive from public scrutiny, but it can alleviate the burden of blame.

    Samantha Schwartz • Nov. 18, 2019
  • Image attribution tooltip
    Danielle Ternes for CIO Dive
    Image attribution tooltip

    What industry gets wrong about cyber insurance

    Despite common perception, recovery from a cyber event — such as paying a ransom — cannot be decided by a carrier.

    Samantha Schwartz • Oct. 31, 2019