Policy & Regulation


  • Entrance greeting sign on the highway border between Nevada and Arizona
    Image attribution tooltip
    Pgiam via Getty Images
    Image attribution tooltip

    Federal, state officials investigating ransomware attack targeting Nevada

    The Sunday attack disrupted key services across the state and led to the theft of some data.

    By Updated Aug. 29, 2025
  • World image
    Image attribution tooltip
    Faruk Ibrahim Alpagut via Getty Images
    Image attribution tooltip

    US charges Oregon man in vast botnet-for-hire operation

    Federal prosecutors called Rapper Bot one of the most powerful DDoS botnets in history.

    By Aug. 21, 2025
  • a software developer writes code while using an external monitor in an office setting Explore the Trendline
    Image attribution tooltip
    Nattakorn Maneerat via Getty Images
    Image attribution tooltip
    Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    NIST seeks input on control overlays for securing AI systems

    The federal agency plans to develop guidance to organizations about various AI use cases.

    By Aug. 18, 2025
  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Trump administration cyber cuts eroding private sector’s trust, confidence

    A report by Swimlane shows companies are reducing cybersecurity spending and security teams are experiencing increasing pressure.

    By Updated Aug. 14, 2025
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    White House urged to revamp cyber regulations

    A leading trade group said the Trump administration should rein in a major pending cybersecurity rule as well as embrace AI-based cyber defenses.

    By Aug. 14, 2025
  • antitrust enforcement
    Image attribution tooltip
    Douglas Rissing via Getty Images
    Image attribution tooltip

    DOJ, international partners take down BlackSuit group’s infrastructure

    BlackSuit has been among the most prolific ransomware gangs in recent years, targeting government agencies, critical manufacturing companies and healthcare firms.

    By Aug. 11, 2025
  • A massive electronic screen that says "DEF CON 2025" and "HUMAN 33" hangs in a large atrium.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    Cyber experts ponder a non-government future for the CVE program

    Organizations supporting the security vulnerability program said it needed changes to improve stability and rebuild trust.

    By Aug. 11, 2025
  • Three men sit on chairs on a stage. One man gestures with his hands while the other two look at him.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA officials say agency is moving ahead despite workforce purge

    Two senior officials defended the agency’s progress amid concerns about the effects of mass layoffs and budget cuts.

    By Aug. 8, 2025
  • A large sign reading "Black Hat" sits in the carpeted foyer of a convention center
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    US still prioritizing zero-trust migration to limit hacks’ damage

    The zero-trust initiative, which gained steam during the Biden administration, is still underway.

    By Updated Aug. 7, 2025
  • Bob Ackerman, founder and managing director of AllegisCyber and DataTribe moderates a Black Hat panel Aug. 5, 2025. Marci McCarthy, director of public affairs at CISA; Rob Joyce, Data Tribe venture partner and former cybersecurity director at the NSA and Patrick Opet, CISO at JPMorgan Chase.
    Image attribution tooltip
    Permission granted by Kesserling Communications
    Image attribution tooltip

    CISA’s relationship with industry needs work to reestablish trust, experts say

    Critics say budget cuts, job losses have hurt the agency’s ability to coordinate with private industry.

    By Aug. 6, 2025
  • Sean Cairncross stands on a stage in front of two microphones
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Senate confirms Trump’s national cyber director nominee

    Sean Cairncross, a political veteran without significant cybersecurity experience, could turn the relatively new White House office into a major player in the administration.

    By Aug. 3, 2025
  • A sign that says Illumina is on a curb in front of red brick buildings.
    Image attribution tooltip
    Courtesy of Illumina
    Image attribution tooltip

    DOJ reaches $9.8 million settlement with Illumina over cyber whistleblower claims

    The U.S. alleged the company knowingly sold genetic-sequencing systems with software vulnerabilities to federal agencies.

    By Updated Aug. 1, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    FBI, CISA warn about Scattered Spider’s evolving tactics

    International authorities are pursuing the group following the arrests of four suspects in a series of attacks targeting British retailers.

    By July 29, 2025
  • Senators push CISA director nominee on election security, agency focus

    Sean Plankey said he would double down on CISA’s core mission and “allow the operators to operate.”

    By July 24, 2025
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

    By July 23, 2025
  • A security scanner extracts the code of a computer virus from a string of binary code (1s and 0s).
    Image attribution tooltip
    Hailshadow via Getty Images
    Image attribution tooltip

    Lapsed CISA contract impedes national lab’s threat-hunting operations

    The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

    By July 23, 2025
  • Aerial view of the Jack H. Wilson Water Treatment Plant in Little Rock, Arkansas.
    Image attribution tooltip
    Permission granted by Central Arkansas Water
    Image attribution tooltip
    Deep Dive

    Dwindling federal cyber support for critical infrastructure raises alarms

    A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

    By July 22, 2025
  • Microsoft, antitrust, Alaily, FTC. Google
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Top US senator calls out supply-chain risk with DoD contractors

    The Senate Intelligence Committee chairman questioned the security of Microsoft’s “digital escort” arrangement with its Chinese employees.

    By Updated July 18, 2025
  • A sign reading "Department of State" sits outside the U.S. State Department headquarters in Washington, D.C.
    Image attribution tooltip
    Pacheco, Isaac. Retrieved from U.S. Department of State / Flickr.
    Image attribution tooltip

    State Department cyber diplomacy firings and changes threaten US defenses

    Departures and restructuring will make it harder for the agency to pursue global policies that strengthen U.S. critical infrastructure, experts said.

    By July 17, 2025
  • Harrods is one of three UK-based retail companies responding to a spree of attacks beginning in April 2025.
    Image attribution tooltip
    Hollie Adams via Getty Images
    Image attribution tooltip

    UK authorities arrest 4 people in probe of retail cyberattack spree

    The arrests mark the first major break in a case linked to the Scattered Spider cybercrime group, although additional work continues with multiple agencies.

    By Updated July 10, 2025
  • A general view of the Marks and Spencer flagship department store.
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    M&S chairman calls for mandatory disclosure of material cyberattacks

    The chairman testified before British lawmakers following a major social-engineering attack on the department-store chain.

    By July 9, 2025
  • Symbolic of Sino-American relations, the flag of the United States of America and the flag of the Republic of China fly together on flag poles next to each other on a sunny, windy day.
    Image attribution tooltip
    Stock via Getty Images
    Image attribution tooltip

    Suspected contractor for China’s Hafnium group arrested in Italy

    U.S. authorities charged the man and a co-conspirator with hacking COVID-19 researchers and kicking off a cyberattack spree targeting Microsoft Exchange servers. 

    By July 8, 2025
  • Longworth Congressional Building
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Security coalition urges Congress to renew 2015 CISA law

    A group of top cybersecurity and technology firms said the law provided critical protections for sharing essential vulnerability information.

    By July 8, 2025
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    SEC seeks SolarWinds settlement in reversal for agency under new leadership

    The decision by the commission, now under Republican control, could reshape the landscape of corporate accountability for cyber incidents.

    By July 7, 2025
  • Sen Ron Wyden sits behind a wooden podium with a microphone.
    Image attribution tooltip
    Sarah Silbiger / Stringer via Getty Images
    Image attribution tooltip

    FBI cyber guidance to lawmakers falls short, US senator says

    Sen. Ron Wyden wants FBI briefings to cover four often-overlooked cybersecurity practices.

    By July 2, 2025