Security


  • 3D illustration of a working quantum computer.
    Image attribution tooltip
    adventtr via Getty Images
    Image attribution tooltip
    Sponsored by Palo Alto Networks

    Building organizational readiness for post-quantum cryptography

    91% of organizations lack a plan for post-quantum cryptography as the quantum era approaches.

    March 30, 2026
  • a woman walks outside of an office branded with Databricks signage
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Databricks unveils agentic security platform to fend-off AI threats

    The data and AI provider's launch of Lakewatch comes amid rising concerns over cyberattacks fueled by agentic AI.

    By Scarlett Evans • March 26, 2026
  • Trendline

    IT Security

    Executives are working to improve the security posture of their businesses, a task that requires cross-function collaboration.

    By CIO Dive staff
  • an AI logo superimposed over an image of a man typing on a laptop
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Companies know AI is essential for cyber defense but aren’t yet seeing returns

    The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders.

    By Eric Geller • March 20, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges organizations to harden endpoint security following Stryker attack

    The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. 

    By David Jones • March 19, 2026
  • A translucent padlock set over a blue digital surface
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    IT values AI in security, but human oversight remains key

    Integration issues and governance concerns limit AI’s effectiveness in security workflows despite widespread adoption, according to a Crogl report.

    By March 18, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Even primitive AI-coded malware helps hackers move faster, thwart attribution

    IBM researchers discovered an autonomously coded backdoor that they called unsophisticated but nonetheless ominous.

    By Eric Geller • March 16, 2026
  • President Donald Trump addresses reporters at the White House on March 3, 2025.
    Image attribution tooltip
    Andrew Harnik via Getty Images
    Image attribution tooltip

    Trump’s new cybersecurity strategy makes promises but lacks details

    In a document released Friday, the administration vowed to increase the government’s use of AI for rapid cyber defense.

    By Eric Geller • March 10, 2026
  • a worker looking at a screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI rises as leaders choose speed over governance

    Most AI initiatives at a department level are going live without formal company oversight even as risks mount, according to an EY survey.

    By Scarlett Evans • March 9, 2026
  • A laptop's screen shows the website of an AI service
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    AI’s ‘connective tissue’ is woefully insecure, Cisco warns

    In a new report, the company also said businesses should beware of the “SolarWinds of AI.”

    By Eric Geller • Feb. 20, 2026
  • Image attribution tooltip
    katleho Seisa via Getty Images
    Image attribution tooltip

    Ransomware attacks increase against IT and food sectors

    Social engineering and zero-day vulnerability weaponization are getting faster and easier, two information sharing and analysis centers said in new reports.

    By Eric Geller • Feb. 13, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Eric Geller • Feb. 4, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    Security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Eric Geller • Jan. 28, 2026
  • European flags in front of the European Commission headquarters in Brussels, Belgium.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    EU wants Google to share its data in compliance with legislation

    The European Commission directed Google to grant third-party providers the same data access as Gemini to comply with the Digital Markets Act.

    By Jan. 27, 2026
  • an exterior shot of coca cola headquarters on a sunny day
    Image attribution tooltip
    Joe Raedle via Getty Images
    Image attribution tooltip

    Coca-Cola taps first-ever chief digital officer

    The beverage maker picked Sedef Salingan Sahin to serve in the newly created CDO role citing a pressing need to accelerate tech adoption.

    By Jan. 14, 2026
  • Nationwide Plaza
    Image attribution tooltip
    Permission granted by Nationwide
    Image attribution tooltip

    Nationwide Financial taps tech veteran as CTO

    Misty Kuamoo will be responsible for technology products supporting the insurer’s financial services businesses, the company announced Friday.

    By Jan. 12, 2026
  • Cybersecurity warning with red warning symbol with binary code
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    How CIOs can brace for AI-fueled cyberthreats

    Executives are carefully tracking the rise in AI use for cyberthreats, bolstering basic preparedness tactics and increasing cyber spend in response.  

    By Jan. 7, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST asks public for help securing AI agents

    The agency is interested in case studies showing how best to protect agents from hackers.

    By Eric Geller • Jan. 7, 2026
  • Doors are fitted and checked during production at the Jaguar Land Rover factory on March 1, 2017 in Solihull, England. Jaguar Land Rover is relaunching certain operations following a September 2025 cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cyber risks grow as manufacturers turn to AI and cloud systems

    Manufacturing has been the most-attacked sector for four years straight, according to a recent IBM report. Experts weigh in on how to balance the costs of security infrastructure with the rapid pace of technological advancement.

    By Sakshi Udavant • Jan. 5, 2026
  • The ServiceNow headquarters campus in Santa Clara, California on Feb. 21, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ServiceNow to buy Armis for $7.75B

    The combination yields a major player in cyber-physical security and exposure management. 

    By David Jones • Dec. 23, 2025
  • Kathy Hochul speaks at a podium.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    New York mandates AI model safety requirements

    Despite President Donald Trump’s executive order challenging states' authority, New York Governor Kathy Hochul signed AI safety legislation into law.

    By Dec. 22, 2025
  • This image depicts the podcast series cover image for Strategy Inc's CIO Dive series, "Unifying Intelligence"
    Image attribution tooltip
    Mariana Ramirez/CIO Dive
    Image attribution tooltip
    Sponsored by Strategy Inc

    [Podcast] Unifying Intelligence

    A podcast decoding the path to consistent, trusted and transparent data for the enterprise

    By CIO Dive's studioID • Dec. 22, 2025
  • Male IT Server Technician Specialist Holds Laptop and Looking on Raining Script Code in Rack Sever Cabinet.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISOs view hybrid environments as best way to manage risk, compliance

    Security leaders are also focused on the convergence of IT and operational technology as business continuity becomes a major concern.

    By David Jones • Updated Dec. 15, 2025
  • Header image for "Empowering the CFO to Champion Cyber Risk Management"
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of global firms plan to boost cyber spending in 2026

    A report by Marsh shows companies are also focused on third-party risk mitigation.

    By David Jones • Dec. 10, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft 365 to include more AI tools – at a higher price

    Commercial pricing for Microsoft’s flagship subscriptions will rise 16% on average starting in July 2026 as the catalog of AI tools expands, the company said Thursday.

    By Dec. 5, 2025
  • An woman passes an AWS logo on an escalator at the AWS re:Invent conference on Dec. 3, 2024 in Las Vegas.
    Image attribution tooltip
    Noah Berger / Stringer via Getty Images
    Image attribution tooltip

    AWS pitches enterprises on frontier agents built for scale, autonomy

    IT teams stand to see the most benefit from AI that can continuously work in the background to put out fires, triage issues and monitor the tech stack.

    By Dec. 3, 2025