Strategy


  • Cybersecurity Challenges in Remote Work, exploring vulnerabilities, evolving threats, employee awareness, digital transformation impacts
    Image attribution tooltip

    stock.adobe.com/peera

    Image attribution tooltip
    Sponsored by Veracode

    How ASPM gives you control over complex architectures

    ASPM gives organizations control by unifying risk data, automating threat analysis, and prioritizing vulnerabilities based on their business impact.

    By Sohail Iqbal, Chief Information Security Officer, Veracode • March 24, 2025
  • Google Cloud logo
    Image attribution tooltip
    Alexander Koerner / Stringer via Getty Images
    Image attribution tooltip

    Google acquisition of Wiz driven by enterprise embrace of multicloud

    The combined security platform will expand Google’s reach across a range of major cloud environments.

    By March 19, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    AI project failure rates are on the rise: report

    The share of businesses scrapping most of their AI initiatives increased to 42% this year, up from 17% last year, according to S&P Global Market Intelligence. 

    By Lindsey Wilkinson • March 18, 2025
  • The IBM logo is pictured on a sign in front of a building in Ontario, Canada on Oct. 30, 2018.
    Image attribution tooltip
    JHVEPhoto via Getty Images
    Image attribution tooltip

    Tech giants seek data standards amid AI push

    Microsoft, IBM and Cisco are among the vendors backing the OASIS Data Provenance Standards Technical Committee announced last week.

    By Matt Ashare • March 14, 2025
  • Federal Communications Commission Commissioner Brendan Carr
    Image attribution tooltip
    Kevin Dietsch / Getty Images via Getty Images
    Image attribution tooltip

    FCC launches national security unit to counter state-linked threats to US telecoms

    The new council is part of an effort to thwart Salt Typhoon and other cyber espionage groups.

    By March 13, 2025
  • A digital depiction of a red triangle sign with an exclamation point in the center with binary code in the background.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    82% of K-12 schools recently experienced a cyber incident

    Cybercriminals are increasingly targeting school networks through phishing and social engineering, a cybersecurity nonprofit reported.

    By Anna Merod • March 12, 2025
  • remote work
    Image attribution tooltip
    Oselote via Getty Images
    Image attribution tooltip

    Majority of ransomware claims involved compromise of perimeter security devices

    A report by cyber insurance firm Coalition shows six of every 10 ransomware claims involved compromised VPN or firewall.

    By March 11, 2025
  • Capitol building, DC
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Former NSA cyber director warns drastic job cuts threaten national security

    Rob Joyce told lawmakers mass layoffs of federal workers will hurt the ability of the U.S. to combat malicious cyber activity from China and other adversaries.

    By March 10, 2025
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    CrowdStrike shares fall as company forecasts lower-than-expected results

    The cybersecurity vendor is ending its customer commitment package, which was launched to help maintain existing relationships.

    By March 5, 2025
  • Rhode Island Chief Digital Officer Brian Tardiff and Gov. Dan McKee speak at a Dec. 30 press briefing on the cyberattack against the RIBridges social services database. The officials held a Jan. 10 briefing to notify thousands of recipients that breach notification letters were being mailed out.
    Image attribution tooltip
    Courtesy of Rhode Island
    Image attribution tooltip

    Critical infrastructure at state, local levels at heightened risk of cyberattacks

    State and local governments need additional resources, shared intelligence and coordination, an MS-ISAC report showed.

    By Feb. 28, 2025
  • Two IT technicians using a laptop in a server room.
    Image attribution tooltip
    Marco VDM via Getty Images
    Image attribution tooltip

    DeepSeek’s AI shake-up could boost cybersecurity risks, spending: report

    The cybersecurity market could grow to $338 billion in value by 2033, driven in part by expanding AI risks, Bloomberg Intelligence analysts said.

    By Alexei Alexis • Feb. 26, 2025
  • Stacks of $100 Dollar bills increasing in size from left to right are pictured.
    Image attribution tooltip
    Henrik5000 via Getty Images
    Image attribution tooltip

    Global tech spend to approach $5 trillion this year: Forrester

    The U.S. market is expected to exceed $2 trillion for the first time, with financial services and insurance leading the charge, the analyst firm said.

    By Matt Ashare • Feb. 21, 2025
  • President Trump is nominating Sean Cairncross to the Office of National Cyber Director.
    Image attribution tooltip
    Riccardo Savi via Getty Images
    Image attribution tooltip

    Trump to nominate Sean Cairncross as national cyber director

    The president will tap the former RNC insider to lead the White House office that oversees nation’s cybersecurity strategy.

    By Feb. 12, 2025
  • SolarWinds
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by ismagilov via Getty Images
    Image attribution tooltip

    Private equity firm to acquire SolarWinds for $4.4B

    SolarWinds, which now will go private, was embroiled in a massive supply chain attack in 2020 linked to Russia-backed threat actors.

    By Feb. 7, 2025
  • Group of professionals collaborating in a bright, modern office space designed for co-working and teamwork.
    Image attribution tooltip
    miniseries via Getty Images
    Image attribution tooltip

    AI agents spark interest, concern for businesses in 2025

    Leaders have high hopes for autonomous capabilities, but adding the technology will raise the stakes for security and governance.

    By Lindsey Wilkinson • Feb. 6, 2025
  • DeepSeek logo in front of China's flag.
    Image attribution tooltip
    Anthony Kwan/Getty Images via Getty Images
    Image attribution tooltip

    DeepSeek surge hits companies, posing security risks

    The Trump administration is scrutinizing the AI app, Italy and Taiwan have banned it, and companies have blocked it.

    By Alexei Alexis • Feb. 5, 2025
  • Office workstation top view of business people working around M&A, keyboard, calculator, phablet and money on wooden table
    Image attribution tooltip
    Atstock Productions via Getty Images
    Image attribution tooltip

    Sophos completes $859M acquisition of Secureworks

    The deal comes amid a flurry of recent merger and acquisition deals in the cybersecurity sector.

    By Feb. 3, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall.
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip

    The cybersecurity outlook for 2025

    Threat actors are exploiting known weak points and enterprises’ dependency across the tech stack. It’s making cybersecurity professionals’ jobs harder than ever before. 

    By Cybersecurity Dive Staff • Feb. 3, 2025
  • Digital cloud and network security. 3D computer hardware illustration.
    Image attribution tooltip
    solarseven
    Image attribution tooltip

    Security tool consolidation boosts efficiency, threat mitigation

    A study from IBM shows the controversial shift to platformization can pay off for enterprises. 

    By Jan. 31, 2025
  • Header image for "How CFOs and CISOs Can Build Strong Partnerships"
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    CISO stature gains traction as global cyber risk escalates

    Security leaders are making inroads with corporate boards and now have a seat at the table with CEOs, a Splunk report shows.

    By Jan. 30, 2025
  • Engineer in network server room.
    Image attribution tooltip
    Stock photos via Getty Images
    Image attribution tooltip
    Deep Dive

    Network security tool defects are endemic, eroding enterprise defense

    When malicious hackers exploit vulnerabilities in firewalls, VPNs and routers, it’s not the vendors that get hit — it’s their customers.

    By Jan. 28, 2025
  • Exterior shot of a corporate campus,
    Image attribution tooltip
    Scott Olson/Getty Images via Getty Images
    Image attribution tooltip

    Procter & Gamble operations unhindered by Blue Yonder disruption

    The consumer goods company built an in-house solution to keep orders moving as its transportation management system provider navigated a ransomware attack.

    By Kelly Stroh • Jan. 28, 2025
  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Biden administration rolls out wide-reaching cybersecurity executive order

    Released in the administration’s final days, the highly-anticipated order follows a series of sophisticated attacks against federal agencies and critical infrastructure providers.

    By Jan. 16, 2025
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cyber disruptions remain top business risk concern in US, globally

    A report from Allianz shows the global disruption caused by CrowdStrike’s IT mishap added to longtime concerns about data breaches and ransomware.

    By Jan. 15, 2025
  • Executives are seen speaking during a meeting.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    World Economic Forum spotlights growing gap in cyber readiness

    Ransomware remains the top cyber risk concern among executives, but CISOs are almost twice as likely as CEOs to make that determination.

    By Jan. 15, 2025