Strategy


  • close up of a worker holding  up a tablet
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Outage disrupts some SentinelOne services

    Company executives said there was no indication the incident was the result of a security issue.

    By May 29, 2025
  • Group of business people holding a jigsaw puzzle pieces. Business solution integration concept.
    Image attribution tooltip
    courtneyk via Getty Images
    Image attribution tooltip

    Zscaler enters agreement to buy Red Canary

    The agreement allows Red Canary to scale, while helping Zscaler expand into MDR.

    By May 28, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • A picture of Masimo's headquarters building.
    Image attribution tooltip
    Mario Tama / Staff via Getty Images
    Image attribution tooltip

    Masimo says cyberattack will not prevent it from fulfilling orders

    The maker of patient monitoring devices said the incident will not have a material effect on its updated financial outlook.

    By May 27, 2025
  • A banner bearing the eagle-and-shield logo of the Cybersecurity and Infrastructure Security Agency and reading "America's Cyber Defense Agency" hangs over a conference booth that contains chairs, posters, speakers, and plants.
    Image attribution tooltip
    CISA. (2024). Retrieved from Flickr.
    Image attribution tooltip

    CISA loses nearly all top officials as purge continues

    Most of the leaders of the agency’s operating divisions and regional offices have left or will leave this month amid the Trump administration’s aggressive government-downsizing campaign.

    By May 27, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks beats earnings estimates amid consolidation, AI concerns

    Investors still have concerns about margins as the company uses incentives to drive customers into unified platform deals.

    By May 22, 2025
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, new research shows.

    By Updated May 21, 2025
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip
    Opinion

    How hospitality companies can stay ahead of cyberattacks this summer

    Hotels are a popular target for cyberattacks, but industry collaboration and intelligence sharing can serve as defense mechanisms.

    By Pam Lindemoen • May 20, 2025
  • Image attribution tooltip
    Lintao Zhang via Getty Images
    Image attribution tooltip

    Researchers warn of China-backed espionage campaign targeting laid-off US workers

    A report by FDD says an elaborate online recruiting effort is using LinkedIn and fake online companies to gather sensitive intelligence.

    By May 20, 2025
  • A woman’s hand is asking an AI chatbot pre-typed questions & the Artificial Intelligence website is answering.
    Image attribution tooltip
    Laurence Dutton via Getty Images
    Image attribution tooltip

    AI is stirring mixed feelings among CFOs, survey finds

    The research highlights a “trust gap between the untested promise of AI and the wariness of security and privacy risks,” finance software company Kyriba said.

    By Alexei Alexis • May 19, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Hearing shows broad support for extension of cyber info-sharing law

    With bipartisan support and backing from the private sector, the 2015 law appears to be on a glide path to reauthorization.

    By May 16, 2025
  • A legal technology concept
    Image attribution tooltip
    Dmitry Nogaev via Getty Images
    Image attribution tooltip

    Tennessee’s largest school district sues PowerSchool over data breach

    Memphis-Shelby County Schools’ federal lawsuit against the ed tech giant is among the latest that have been filed by over 100 other districts nationwide.

    By Anna Merod • May 16, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • The St. Louis cityscape of buildings, bridges and Gateway Arch are shown from afar.
    Image attribution tooltip
    Art Wager via Getty Images
    Image attribution tooltip

    Lee Enterprises spent $2M for ransomware recovery

    The newspaper chain said the attack will have lingering impacts on its balance sheet, and its lender waived certain payments.

    By May 12, 2025
  • The Pentagon, the headquarters of the U.S. Department of Defense in Arlington, Va., is seen from the sky.
    Image attribution tooltip
    Alex Wong/Getty via Getty Images
    Image attribution tooltip

    Defense contractors get a head start on CMMC audits

    Software investments, infrastructure upgrades and compliance documentation topped the list of Cybersecurity Maturity Model Certification implementation costs, a new survey shows.

    By May 12, 2025
  • Beautiful Asian female e-commerce business startup using her mobile phone
    Image attribution tooltip

    stock.adobe.com/bongkarn

    Image attribution tooltip
    Sponsored by Imprivata

    Passwordless authentication: Where security meets productivity

    Say goodbye to password fatigue. Say hello to a more secure, efficient future.

    By Joel Burleson-Davis, Chief Technology Officer, Imprivata • May 12, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    CIOs pay too much for not enough IT security

    Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.

    By Nicole Laskowski • May 9, 2025
  • CrowdStrike CEO George Kurtz
    Image attribution tooltip
    Courtesy of CrowdStrike
    Image attribution tooltip

    CrowdStrike to cut 500 jobs in plan to scale business

    The cybersecurity firm has faced increasing market pressures amid a scramble by rivals to consolidate enterprise customers on unified platforms.

    By Updated May 8, 2025
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    Airlines in North America prioritize investments in cyber, AI

    Spending plans come amid rising concerns over third-party cyber risk. 

    By May 6, 2025
  • Military Surveillance Officer Working on a City Tracking Operation in a Central Office Hub for Cyber Control and Monitoring for Managing National Security, Technology and Army Communications.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    DOD plans to fast-track software security reviews

    The Pentagon will lay out new security requirements and approval processes for the software it purchases.

    By May 5, 2025
  • The Honda logo is displayed at the Howdy Honda dealership on March 18, 2024 in Austin, Texas.
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    American Honda steers AI efforts with data governance, quality focus

    The generative AI early adopter has worked to improve data management as it aims for better model accuracy and performance to bolster decision-making. 

    By Lindsey Wilkinson • May 5, 2025
  • Salesforce
    Image attribution tooltip
    Sundry Photography via Getty Images
    Image attribution tooltip

    Salesforce expands model lineup in support of agentic AI

    The software vendor added variations to its family of large action models for on-device implementation, limited GPU resources and industrial applications.

    By Lindsey Wilkinson • May 2, 2025
  • A view inside the Sphere is seen during Google Cloud Next "25: AI Exclusive at the Sphere" on April 8, 2025 in Las Vegas,
    Image attribution tooltip
    Candice Ward / Stringer via Getty Images
    Image attribution tooltip

    Google pours billions into AI, cyber and infrastructure expansion

    The tech giant's cloud profits more than doubled year over year as it invested more than $17 billion, primarily in servers and data centers.

    By Matt Ashare • May 1, 2025
  • DHS logo
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Salt Typhoon telecom hacks one of the most consequential campaigns against US ever, expert says

    A prominent former member of a recently shuttered cyber-incident review panel said the board should be reconstituted with independent authority.

    By May 1, 2025
  • Patrick Opet, the global chief information security officer for JPMorgan Chase
    Image attribution tooltip

    JPMorgan Chase

    Image attribution tooltip

    JPMorgan Chase CISO warns software industry on supply chain security

    In an open letter, Patrick Opet said third-party vendors need to embrace secure development practices over speed to market. 

    By April 28, 2025