Latest from todaynewsNew Trojan ZenRAT masquerades as Bitwarden password managerA report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities.By Lucian ConstantinSep 28, 20234 minsCyberattacksCyberattacksCyberattacks news FIDO Alliance certifies security of edge nodes, IoT devices By Michael HillSep 27, 20233 minsCertificationsInternet SecuritySecurity Hardwarenews analysis Web app, API attacks surge as cybercriminals target financial servicesBy Michael HillSep 27, 20236 minsFinancial Services IndustryCyberattacksApplication Security newsImmersive Labs adds custom 'workforce exercising' for each organizational role By Shweta Sharma Sep 27, 20233 minsSecurity Software newsSysdig unveils cloud attack graph based on real-time threat dataBy Michael Hill Sep 27, 20233 minsThreat and Vulnerability ManagementCloud SecurityStorage Security featureWhat’s a cyber incident response retainer and why do you need one?By Linda Rosencrance Sep 27, 20238 minsCyberattacksIncident ResponseSecurity Practices newsBaffle releases encryption solution to secure data for generative AIBy Michael Hill Sep 26, 20233 minsEncryptionGenerative AIData and Information Security newsCISOs are struggling to get cybersecurity budgets: ReportBy Shweta Sharma Sep 26, 20234 minsBudgetTechnology Industry featureWhat is WorldCoin's proof-of-personhood system? By Matthew Tyson Sep 26, 202312 minsCryptocurrencyCryptocurrencyCryptocurrency Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI newsInsider risks are getting increasingly costlyBy Jon Gold Sep 20, 2023 3 minsBudgetData and Information Security newsUS cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacksBy Michael Hill Sep 20, 2023 3 minsInsurance IndustryRisk Management newsIntel Trust Authority attestation services now in general availabilityBy Michael Nadeau Sep 20, 2023 3 minsZero TrustZero TrustAccess Control View topic Cybercrime newsVenafi taps generative AI to streamline machine identity managementBy Shweta Sharma Sep 20, 2023 6 minsGenerative AIIdentity Management Solutions newsSkyhawk Security ranks accuracy of LLM cyberthreat predictionsBy Michael Hill Sep 20, 2023 3 minsThreat and Vulnerability ManagementGenerative AIRisk Management newsOnline Safety Bill passes final parliament debate, set to become UK lawBy Michael Hill Sep 20, 2023 3 minsEncryptionCompliancePrivacy View topic Careers feature4 steps for purple team successBy Maril Vernon Sep 20, 2023 7 minsPenetration TestingPenetration TestingThreat and Vulnerability Management news analysisNew server backdoors posing as security product target telecomsBy Lucian Constantin Sep 19, 2023 4 minsAdvanced Persistent ThreatsTelecommunications IndustryNetwork Security newsCrowdStrike announces major build-out of its Falcon product suiteBy Michael Nadeau Sep 19, 2023 4 minsIncident ResponseGenerative AIEndpoint Protection View topic IT Leadership newsHow to avoid the Microsoft GitHub goof that exposed 38TB of sensitive employee dataBy Shweta Sharma Sep 19, 2023 5 minsAccess ControlDevSecOps newsSecurity startup Discern launches AI-powered policy management platformBy Michael Hill Sep 19, 2023 2 minsGenerative AISecurity Operations Center feature6 notable API security initiatives launched in 2023By Michael Hill Sep 19, 2023 7 minsApplication SecurityApplication SecurityApplication Security View topic Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Data-driven Leadership & GenAIOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security 08/Nov in-person event FutureIT New York - AI, Data and Tech Leadership: Finding business value from emerging tech innovationsNov 08, 2023New York, NY Digital TransformationData and Information SecurityIT Leadership View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news UK Cyber Security Council CEO reflects on a year of progress By Michael Hill Sep 27, 20233 mins GovernmentData and Information SecuritySecurity Practices news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest By Michael Hill Sep 26, 20234 mins Back to SchoolEducation IndustryIT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme By Michael Hill Sep 26, 20233 mins IT Governance FrameworksIncident ResponseData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO