Policy & Regulation


  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Congress wants details from White House on cyber strategy, Iran resilience measures

    Lawmakers’ aides from both parties say they want to be kept in the loop on implementation.

    By March 25, 2026
  • A man wearing a blue suit and purple tie gestures with both hands while sitting in a chair on a stage
    Image attribution tooltip
    John Lamparski via Getty Images
    Image attribution tooltip

    FCC bans import of consumer-grade routers amid national security concerns

    The decision follows years of escalating attacks against the U.S. from state-linked threat groups targeting routers and edge devices.

    By Updated March 24, 2026
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies know AI is essential for cyber defense but aren’t yet seeing returns

    The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.

    By March 20, 2026
  • antitrust enforcement
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    DOJ confirms seizure of domains linked to Iran-backed threat actor

    A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker. 

    By March 20, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges organizations to harden endpoint security following Stryker attack

    The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. 

    By March 19, 2026
  • National cyber director expands on Trump administration’s vision for AI security, industry collaboration

    The government wants AI firms to embrace security, not see it as a barrier.

    By Updated March 17, 2026
  • person looking up
    Image attribution tooltip

    Commvault via Midjourney

    Image attribution tooltip
    Sponsored by Commvault

    AI agent security: New governance framework shows progress, but critical gaps remain

    New AI security framework shows progress, but seven critical vulnerabilities still need your attention.

    March 16, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    Industry to NIST: Keep agentic AI standards flexible and voluntary

    The business community said security guidance should reflect the nascency and diversity of the field.

    By March 11, 2026
  • An Iranian flag flutters in front of a building with many windows
    Image attribution tooltip
    Michael Gruber via Getty Images
    Image attribution tooltip

    US entities face heightened cyber risk related to Iran war

    The military campaign against Iran is putting local governments, critical infrastructure providers and major U.S. companies at heightened risk of disruptive attacks.

    By March 10, 2026
  • A sign that says "Government Accountability Office" and shows the GAO's seal sits in front of the agency's headquarters
    Image attribution tooltip
    Retrieved from GAO.
    Image attribution tooltip

    Conflicting definitions and timelines cause cybersecurity regulation morass, industry reps say

    A recent Government Accountability Office report highlights businesses’ frustrations with the way the government currently oversees cybersecurity.

    By March 9, 2026
  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

    By March 6, 2026
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft, Europol disrupt global phishing platform Tycoon 2FA

    The service helped cybercriminals bypass multifactor authentication and led to business email compromise and ransomware.

    By March 5, 2026
  • Plankey’s nomination as CISA director now in jeopardy

    News that Sean Plankey has left his post at DHS comes amid rising risks to U.S. critical infrastructure from Iran-linked hackers and worries over a weakened CISA.

    By Updated March 5, 2026
  • Iranians protest against attacks on Iran by Israel and the United States on February 28, 2026 in Tehran, Iran. Iran launched a wave of missiles at Israel and regional U.S. military sites in response to today's attacks, in which the U.S. and Israel struck a series of locations across the country.
    Image attribution tooltip
    Majid Saeedi via Getty Images
    Image attribution tooltip

    Iran-linked hackers raise threat level against US, allies

    Security researchers warn that hacktivists and state-linked groups are using DDoS, phishing and other tactics against critical infrastructure.

    By Updated March 2, 2026
  • Three people sit at a table in a congressional hearing room
    Image attribution tooltip
    Heather Diehl via Getty Images
    Image attribution tooltip

    Trump administration removes controversial acting CISA director

    The new agency chief, Nick Andersen, has significantly more senior cybersecurity leadership experience, which has given some demoralized employees hope.

    By Updated Feb. 27, 2026
  • mechanical gears and circuits
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    New security research finds governance determines trust in AI

    As AI adoption deepens, governance determines whether security teams can trust it.

    By Niall Heffernan, Staff GRC Analyst, Tines • Feb. 17, 2026
  • An American flag and a flag bearing the seal of the Cybersecurity and Infrastructure Security Agency (which features an eagle holding a shield with elements of a skyline on it) flank a large upright square panel bearing the same CISA seal. On the wall to the right of the panel and the flags, a row of digital clocks shows the time in the four major U.S. time zones.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    CISA seeks infrastructure sector consultation on incident reporting rule

    The agency is particularly interested in feedback on several aspects of the long-awaited regulation.

    By Feb. 12, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to disconnect unsupported network edge devices

    The government is worried about hackers accessing systems through insecure and poorly monitored routers, firewalls and similar equipment at the network perimeter.

    By Feb. 5, 2026
  • Two men sit on a stage in front of a blue backdrop bearing the logos of a conference and its sponsors
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    National cyber director solicits industry help in fixing regulations, threat information-sharing

    President Donald Trump’s chief cybersecurity adviser said a forthcoming national strategy will kick off ambitious projects.

    By Feb. 3, 2026
  • The north facade of the White House is seen partially illuminated at night
    Image attribution tooltip
    Samuel Corum via Getty Images
    Image attribution tooltip

    National cybersecurity strategies depend on public-private trust, report warns

    An influential cybersecurity think tank urged governments to consult extensively with a wide variety of business stakeholders before making ambitious plans.

    By Feb. 3, 2026
  • The red, white, blue, and gold seal of the Federal Communications Commission hangs on a wooden wall
    Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    FCC urges telecoms to boost cybersecurity amid growing ransomware threat

    The commission said it was aware of ransomware disruptions at a growing number of small and medium-sized telecoms.

    By Feb. 2, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • A project engineer talks to a computer operator who points to screens showing AI and machine learning enhanced tools.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Q&A

    How Granite complied with new federal cyber regs before a critical deadline

    To reach Cybersecurity Maturity Model Certification Level 2, CTO Malcolm Jack learned implementation was as much about people as it was the technology.

    By Matthew Thibault • Jan. 30, 2026
  • Computer language script and coding on screen.
    Image attribution tooltip
    themotioncloud via Getty Images
    Image attribution tooltip

    Federal pivot on software security oversight could complicate vendor strategies

    Software companies cheered the elimination of a government-wide attestation mandate. What comes next could be messy.

    By Jan. 28, 2026
  • Man using a laptop at work
    Image attribution tooltip
    Morsa Images via Getty Images
    Image attribution tooltip
    Sponsored by Cisco Duo

    Top 3 factors for selecting an identity access management tool

    Identity and access management (IAM) ensures that people and entities with digital identities have the right level of access to your enterprise resources.

    Jan. 26, 2026