Strategy


  • Anne Neuberger, deputy national security advisor for cyber and emerging technology, speaks at the White House.
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Biden administration rolls out wide-reaching cybersecurity executive order

    Released in the administration's final days, the highly-anticipated order follows a series of sophisticated attacks against federal agencies and critical infrastructure providers.

    By Jan. 16, 2025
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Cyber disruptions remain top business risk concern in US, globally

    A report from Allianz shows the global disruption caused by CrowdStrike’s IT mishap added to longtime concerns about data breaches and ransomware.

    By Jan. 15, 2025
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendlineâž”
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    Now, public companies have to detail their cybersecurity risk management in annual filings, raising awareness on what many cyber experts already knew — security issues are business issues. 

    By Cybersecurity Dive staff
  • Executives are seen speaking during a meeting.
    Image attribution tooltip
    AzmanL via Getty Images
    Image attribution tooltip

    World Economic Forum spotlights growing gap in cyber readiness

    Ransomware remains the top cyber risk concern among executives, but CISOs are almost twice as likely as CEOs to make that determination.

    By Jan. 15, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA pins modest security gains to performance goals program

    The federal agency said the number of critical infrastructure organizations enrolled in its vulnerability scanning program nearly doubled since 2022.

    By Jan. 14, 2025
  • Sponsored by Imprivata

    The double-edged sword of AI in cybersecurity: driving efficiency gains, meeting compliance requirements and navigating greater risk

    Discover the dual impact of AI in cybersecurity: enhancing efficiency and compliance while opening new risk avenues.

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Jan. 13, 2025
  • CISA Director Jen Easterly
    Image attribution tooltip

    Center for Strategic and International Studies

    Image attribution tooltip

    CISA director reiterates prior calls for C-suites, boards to take cyber risk ownership

    Jen Easterly said companies need to consider cybersecurity threats as core risks that need to be fully incorporated into corporate business strategy.

    By Jan. 10, 2025
  • Group of people working in a modern board room with augmented reality interface, all objects in the scene are 3D
    Image attribution tooltip
    piranka via Getty Images
    Image attribution tooltip

    4 cybersecurity trends to watch in 2025

    Critical industries are up against never before seen challenges to remain secure and operational, while regulatory pressures have completely upended the role of the CISO in corporate America.

    By , Jan. 9, 2025
  • Harry Coker Jr. speaking before the Foundation for the Defense of Democracies on Jan. 7, 2025.
    Image attribution tooltip
    Permission granted by Foundation for Defense of Democracies
    Image attribution tooltip

    National cyber director calls for deterrence against China-affiliated cyber threats

    Harry Coker Jr. said China and other adversaries cannot be allowed free reign to conduct malicious cyber activities.   

    By Jan. 9, 2025
  • A candlestick stock chart is seen out of focus against a background of $100 dollar bills in this composite stock image.
    Image attribution tooltip
    Honglouwawa via Getty Images
    Image attribution tooltip

    Investors narrow scope of cyber funding deals in 2024

    Total funding was up 9% year over year to $9.5 billion. More than half of all dollars raised went to late-stage rounds, Pinpoint Search Group said.

    By Jan. 8, 2025
  • Anne Neuberger deputy national security advisor for cyber and emerging technologies, speaks at the Billington Cybersecurity Summit with Brad Medairy, EVP, Booz Allen.
    Image attribution tooltip
    Courtesy of Billington CyberSecurity Summit
    Image attribution tooltip

    White House program to certify the security of IoT devices goes live

    The White House is also working on an executive order to limit federal purchasing of connected products that meet the minimum security standards under the program.

    By Jan. 8, 2025
  • Artificial Intelligence Machine Learning Natural Language Processing Data Technology
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    What companies need to help secure AI

    Experts say MLOps will bridge the gap between development and operations, creating room for the inclusion of security and privacy practices, too.

    By Sue Poremba • Jan. 6, 2025
  • Apps for generative AI tools, including ChatGPT, Gemini and Copilot, are pictured on an Apple iPhone on Aug. 22, 2024 in Toronto, Canada.
    Image attribution tooltip
    Kenneth Cheung via Getty Images
    Image attribution tooltip

    Cyber leaders are bullish on generative AI despite risks: report

    Executives say they would overhaul tooling in exchange for better generative AI capabilities, according to a CrowdStrike survey.

    By Lindsey Wilkinson • Jan. 3, 2025
  • 3D digital circular dynamic wave.
    Image attribution tooltip
    Vitalii Pasichnyk/Getty via Getty Images
    Image attribution tooltip

    White House says 9th telecom company hit in Salt Typhoon spree

    A senior official blamed the intrusions on lax security and said in one case the compromise of a single administrator account led to access of over 100,000 routers.

    By Dec. 27, 2024
  • Person waits to enter Apple Store in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    CISA mobile security advice gets personal in wake of telecom intrusions

    The agency’s recommendations are not for the technically inept. Yet the extraordinary measures, including the use of encrypted apps, are applicable to all audiences.

    By Dec. 19, 2024
  • A facade of the U.S. Environmental Protection Agency signage on the wall of its building
    Image attribution tooltip
    Joe Cicak via Getty Images
    Image attribution tooltip

    Pennsylvania representative pitches bill to double cyber assistance for local water systems

    The proposed legislation comes amid a surge in ransomware and state-linked attacks against U.S. water utilities.

    By Dec. 17, 2024
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA’s pre-ransomware alerts nearly doubled in 2024

    The federal agency’s efforts to improve defenses surged in fiscal year 2024. Yet, attacks continue to climb.

    By Dec. 17, 2024
  • An information screen informs travellers that train information is not running due to the global technical outage at Canal Street subway station on July 19, 2024 in New York City.
    Image attribution tooltip
    Adam Gray / Stringer via Getty Images
    Image attribution tooltip

    Executives see another CrowdStrike-level IT outage on the horizon

    IT and business leaders admit to prioritizing security at the expense of service disruption readiness, a PagerDuty report found.

    By Matt Ashare • Dec. 13, 2024
  • Snowflake office building in San Mateo, CA.
    Image attribution tooltip
    Permission granted by Snowflake
    Image attribution tooltip

    Snowflake to phase out single-factor authentication by late 2025

    The security policy change starts one year after a wave of attacks targeted more than 100 Snowflake customer environments without MFA.

    By Dec. 10, 2024
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Credit risk rising as attackers strike larger companies: Moody’s

    Cybercriminals are deploying generative AI tools in their efforts at ransomware and fraud, Moody’s Ratings said.

    By Jim Tyson • Dec. 10, 2024
  • African engineer are analyzing problems with robotic arms in manufacturing with tablets
    Image attribution tooltip
    Permission granted by Imprivata
    Image attribution tooltip
    Sponsored by Imprivata

    Frontline workforce tech predictions for 2025: A new era of efficiency and security

    2025 Predictions: Boosting frontline efficiency with passwordless tech and identity and access management innovations

    By Joel Burleson-Davis, SVP Worldwide Engineering, Cyber • Dec. 9, 2024
  • An information screen informs travellers that train information is not running due to the global technical outage at Canal Street subway station on July 19, 2024 in New York City.
    Image attribution tooltip
    Adam Gray / Stringer via Getty Images
    Image attribution tooltip

    For IT pros, the CrowdStrike crisis was a ‘call to arms’

    The global outage triggered investments in people, processes and technologies to beef up enterprise resilience, Adaptavist research found.

    By Matt Ashare • Dec. 6, 2024
  • A large hallway with supercomputers inside a server room at a cloud data center
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip
    Opinion

    Protecting the cloud: combating credential abuse and misconfigurations

    To defend against two of today’s biggest cloud security threats, organizations must adapt and develop proactive strategies, Google Cloud’s Brian Roddy writes. 

    By Brian Roddy • Dec. 5, 2024
  • T-Mobile storefront in Washington.
    Image attribution tooltip
    Anna Moneymaker/Getty Images via Getty Images
    Image attribution tooltip
    Q&A

    T-Mobile undeterred as telecom sector reels from attack campaign

    Cybersecurity Dive spoke with CSO Jeff Simon about how the carrier says it thwarted a threat group resembling Salt Typhoon despite its past security failures.

    By Dec. 5, 2024
  • A skyline shot of a large city, bifurcated by a large river.
    Image attribution tooltip
    Alihan Usullu via Getty Images
    Image attribution tooltip

    UK cyber chief warns country is at an inflection point as digital threats rise

    In his first major speech, NCSC CEO Richard Horne said state linked and criminal threat groups are working to undermine the nation’s reliance on technology. 

    By Dec. 3, 2024
  • A large commercial building with a green grass lawn is framed through a wire metal fence mesh. National Institutes of Standards and Technology in Gaithersburg, Md., on April 17, 2022.
    Image attribution tooltip
    The image by Jerrye & Roy Klotz, M.D. is licensed under CC BY-SA 4.0
    Image attribution tooltip

    When password rules change, who benefits?

    As the National Institute of Standards and Technology rolls out updated password guidance, some experts want to make passwords a thing of the past.

    By Sue Poremba • Dec. 2, 2024