Latest from todayfeatureTop cybersecurity M&A deals for 2023Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in 2023.By CSO StaffSep 22, 202324 minsMergers and AcquisitionsMergers and AcquisitionsMergers and Acquisitions news analysis China’s offensive cyber operations support “soft power” agenda in AfricaBy Michael HillSep 21, 20235 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructurenews Gitlab fixes bug that exploited internal policies to trigger hostile pipelinesBy Shweta SharmaSep 21, 20233 minsVulnerabilities featureKey findings from the CISA 2022 Top Routinely Exploited Vulnerabilities reportBy Chris Hughes Sep 21, 20238 minsZero TrustThreat and Vulnerability ManagementSecurity Practices newsInsider risks are getting increasingly costlyBy Jon Gold Sep 20, 20233 minsBudgetData and Information Security newsUS cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacksBy Michael Hill Sep 20, 20233 minsInsurance IndustryRisk Management newsIntel Trust Authority attestation services now in general availabilityBy Michael Nadeau Sep 20, 20233 minsZero TrustSecurity Hardware newsVenafi taps generative AI to streamline machine identity managementBy Shweta Sharma Sep 20, 20236 minsGenerative AIIdentity Management Solutions newsSkyhawk Security ranks accuracy of LLM cyberthreat predictionsBy Michael Hill Sep 20, 20233 minsThreat and Vulnerability ManagementGenerative AIRisk Management Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI news analysisCyber-related False Claims actions are on the uptickBy Cynthia Brumfield Sep 18, 2023 7 minsRegulationComplianceSecurity Practices featureShelter from the storm - lessons learned from the Storm-0558 Microsoft email attacksBy Susan Bradley Sep 18, 2023 6 minsCSO and CISOEmail SecurityCyberattacks featureThe biggest data breach fines, penalties, and settlements so farBy Michael Hill Sep 18, 2023 14 minsData BreachSecurity View topic Cybercrime news analysisIranian cyberspies target thousands of organizations with password spray attacksBy Lucian Constantin Sep 15, 2023 6 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure brandpostSponsored by SophosHow Attackers Get In: Unpatched Vulnerabilities and Compromised Credentials Sep 15, 2023 6 minsCyberattacks newsHackers behind MGM cyberattack thrash the casino's incident responseBy Shweta Sharma Sep 15, 2023 5 minsRansomwareIncident Response View topic Careers newsNew CISO appointments 2023By CSO Staff Sep 15, 2023 22 minsCSO and CISOCareersSecurity brandpostSponsored by Microsoft Security5 cyber hygiene strategies to help prevent cyber attacksBy Microsoft Security Sep 14, 2023 6 minsSecurity brandpostSponsored by FortinetCritical cloud-delivered security services for SASEBy Satish Madiraju Sep 14, 2023 7 minsCloud Security View topic IT Leadership newsJFrog combines ML development with DevSecOpsBy Shweta Sharma Sep 14, 2023 4 minsDevSecOps opinion10 principles to ensure strong cybersecurity in agile developmentBy Steve Durbin Sep 14, 2023 6 minsDevSecOpsAgile DevelopmentSecurity Practices news analysisAutomotive supply chain vulnerable to attack as cybersecurity regulation loomsBy Michael Hill Sep 14, 2023 5 minsRegulationAutomotive IndustrySupply Chain View topic Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Data-driven Leadership & GenAIOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security 08/Nov in-person event FutureIT New York - AI, Data and Tech Leadership: Finding business value from emerging tech innovationsNov 08, 2023New York, NY Digital TransformationData and Information SecurityIT Leadership View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news analysis Australia’s new cybersecurity strategy: Build “cyber shields” around the country By Samira Sarraf Sep 18, 20236 mins GovernmentData and Information Security brandpost The CSO, Thales, and Tech Data Roundtable Recap: ‘Utilising Shared Experiences and Insight to Define Best Practice Methods for Protecting User Privacy’ Sep 17, 20235 mins IDG Events news Greater Manchester Police officers’ data exposed in ransomware attack By Michael Hill Sep 14, 20233 mins RansomwareGovernmentCyberattacks podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO