Security


  • CrowdStrike booth at Black Hat USA 2023 in Las Vegas.
    Image attribution tooltip
    Matt Kapko/CIO Dive
    Image attribution tooltip

    Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy

    After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.

    By David Jones • June 3, 2025
  • a group of executives inside a conference room
    Image attribution tooltip
    Goodboy Picture Company via Getty Images
    Image attribution tooltip

    AI drives cyber strategies, security execs say

    Basic vulnerabilities account for most cyberattacks, but security leaders say they’re more concerned about the risks of AI, Arctic Wolf research shows.

    By Eric Geller • May 30, 2025
  • A Home Depot storefront in Oxon Hill, Maryland on June 22, 2024.
    Image attribution tooltip
    Neal McNeil via Getty Images
    Image attribution tooltip

    Home Depot elevates CIO from within as AI adoption plans progress

    Angie Brown will lead technology strategy for the home improvement retail giant after a 27-year career with the company.

    By May 30, 2025
  • two executives walking down a staircase in an office
    Image attribution tooltip
    NoSystem images via Getty Images
    Image attribution tooltip

    How CIOs and CISOs can improve their collaboration

    IT and security leaders best serve their organizations when there are clearly defined roles and mutual respect for their counterparts’ objectives.

    By May 28, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Supatman via Getty Images
    Image attribution tooltip
    Opinion

    How to prevent AI agents from becoming data security threats

    Agentic AI promises productivity boosts but could also create major security risks. For CIOs, relying on well-established governance policies could make the difference.

    By Rahul Auradkar • May 20, 2025
  • Longworth Congressional Building
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Congress faces pressure to renew cyber information-sharing law

    The law’s expiration in September could jeopardize information-sharing partnerships that have helped thwart cyberattacks in the U.S.

    By Eric Geller • May 16, 2025
  • The letters AI on a digital block
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    Generative AI may shoulder up to 40% of workload, some bank execs predict

    Six in 10 bank executives list generative AI as a top investment priority this year, according to a survey published in April by KPMG.

    By Caitlin Mullen • May 15, 2025
  • Snowglobe connected to a door with a key
    Image attribution tooltip
    Permission granted by Tines
    Image attribution tooltip
    Sponsored by Tines

    5 practical ways to drive security and IT team alignment

    Could security and IT become your organization’s power couple? Here are 5 ways to make it happen.

    May 12, 2025
  • A United Airlines Airbus 320 loads up at the gate before a flight at George Bush International Airport, Houston, Texas on July 27, 2023.
    Image attribution tooltip
    johnemac72 via Getty Images
    Image attribution tooltip

    Airlines in North America prioritize investments in cyber, AI

    Spending plans come amid rising concerns over third-party cyber risk. 

    By David Jones • May 7, 2025
  • A closeup shot of long colorful lines of code on a computer screen.
    Image attribution tooltip
    Wirestock via Getty Images
    Image attribution tooltip

    CIOs pay too much for not enough IT security

    Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group.

    By May 6, 2025
  • Digital people icons connected to each other cover over the American flag
    Image attribution tooltip

    123RF / perfectpixelshunter

    Image attribution tooltip
    Sponsored by Snowflake

    Achieving IL5: Empower mission success for the DOD

    Deploy an end-to-end, fully managed & secure platform, from pilot initiatives to DOD-wide workloads.

    By Matthew Rose, Director of Government Affairs, Snowflake • May 5, 2025
  • A text bubble labeled "AI" alludes to an image of ChatGPT.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    AI-fueled cybercrime may outpace traditional defenses

    Defenders should begin using AI to counter cyber criminals’ adoption of the technology, according to security firm Check Point.

    By Eric Geller • May 2, 2025
  • A view inside the Sphere is seen during Google Cloud Next "25: AI Exclusive at the Sphere" on April 8, 2025 in Las Vegas,
    Image attribution tooltip
    Candice Ward / Stringer via Getty Images
    Image attribution tooltip

    Google pours billions into AI, cyber and infrastructure expansion

    The tech giant's cloud profits more than doubled year over year as it invested more than $17 billion, primarily in servers and data centers.

    By April 25, 2025
  • Executives working through an AI training course.
    Image attribution tooltip
    Weedezign via Getty Images
    Image attribution tooltip

    AI impact on data breach outcomes remains ‘limited’: Verizon

    While AI-generated text in malicious emails has doubled, the rate of successful phishing breaches is stable, according to a Wednesday report.

    By April 23, 2025
  • A sign reading "bank" hangs on a building.
    Image attribution tooltip
    assalve via Getty Images
    Image attribution tooltip

    Banks gear up to boost cybersecurity, cloud and data spending

    In the race to scale generative AI capabilities, executives plan to increase foundational technology investments, according to Broadridge.

    By April 21, 2025
  • A sign is seen at the Microsoft headquarters on July 3, 2024 in Redmond, Washington.
    Image attribution tooltip
    David Ryder via Getty Images
    Image attribution tooltip

    Microsoft strengthens in-house cyber governance, training

    As part of its Secure Future Initiative, Microsoft overhauled security practices following a series of crippling cyberattacks.

    By David Jones • April 21, 2025
  • an exterior view of the US Capitol building
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Bipartisan bill seeks extension to cyber threat info-sharing

    Two federal lawmakers proposed a renewal of the Cybersecurity Information Sharing Act of 2015, which is due to expire in September.

    By Elizabeth Montalbano, Contributing Reporter • April 18, 2025
  • A screen displays an announcement on possible travel delays due to a global IT outage Gatwick Airport on July 19, 2024 in Crawley, United Kingdom.
    Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Aviation sector faces rising cyber risks due to vulnerable software, aging tech

    A report published Thursday called on federal authorities to conduct comprehensive risk assessments and take steps to modernize the air traffic control system.

    By David Jones • April 15, 2025
  • Person using multiple devices.
    Image attribution tooltip
    AntonioGuillem/Getty Images Plus via Getty Images
    Image attribution tooltip

    Remote access tools most frequently targeted as ransomware entry points

    Supply chain risk via third-party vendors increased sharply in 2025, according to a report by At-Bay.

    By David Jones • April 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    CIOs worry about cyber threats, tech talent

    Tech executives grapple with a looming skills gap as they juggle cybersecurity with the speed of innovation, according to an Experis survey.

    By April 11, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    AI agents emerge as potential targets for cyberattackers

    Digital entities, including bots and agents, pose a growing cybersecurity risk for enterprises, researchers found.

    By Alexei Alexis • April 8, 2025
  • A picture from above of an IT Engineer Servicing Part of a Supercomputer.
    Image attribution tooltip
    CasarsaGuru via Getty Images
    Image attribution tooltip

    Where enterprises go wrong with cloud networking

    While most companies have figured out how to migrate data without incurring huge fees, getting it back can be costly, according to Forrester.

    By April 3, 2025
  • A hand holds a magnifying glass over a digital warning sign with red exclamation marks.
    Image attribution tooltip
    Supatman via Getty Images
    Image attribution tooltip

    Enterprises beef up cybersecurity plans to mitigate AI risks

    More than 2 in 5 leaders say they’ve strengthened practices to curb increased threats, misuse and other vulnerabilities tied to using the technology.

    By March 28, 2025
  • Shot of technology and paperwork on a desk in an empty home office at night
    Image attribution tooltip
    Delmaine Donson via Getty Images
    Image attribution tooltip

    What’s keeping technology leaders up at night?

    From skill gaps and governance hurdles to the rush of AI advancements, executives from Mondelēz, EY, Walmart and other enterprises share what worries them.

    By March 26, 2025
  • Google Cloud logo
    Image attribution tooltip
    Alexander Koerner / Stringer via Getty Images
    Image attribution tooltip

    Google acquisition of Wiz driven by enterprise embrace of multicloud

    The combined security platform will expand Google’s reach across a range of major cloud environments.

    By David Jones • March 19, 2025