Latest from todaynews analysisMicrosoft email breach: Attackers accessed internal systems, source codeThe Russia-sponsored APT group appears to have increased its activity in an attempt to leverage secrets gained from the Microsoft email breach discovered in January. By Lucian ConstantinMar 08, 20244 minsAdvanced Persistent ThreatsEmail SecurityCyberattacks news Data breaches caused by insiders can cost you over $15 millionBy Shweta SharmaMar 08, 20245 minsData Breachfeature Top cybersecurity M&A deals for 2024By CSO StaffMar 08, 202411 minsMergers and AcquisitionsData and Information SecurityIT Leadership newsTop cybersecurity product news of the weekBy CSO staff Mar 08, 202461 minsGenerative AISecurity news analysisVMware patches critical flaws that could allow attackers to escape VMsBy Lucian Constantin Mar 07, 20243 minsNetwork SecurityVulnerabilities newsTeamCity supply chain bugs receive massive exploitationBy Shweta Sharma Mar 07, 20243 minsBugsVulnerabilities newsEx-Google engineer charged with theft of AI tech for Chinese firmsBy Prasanth Aby Thomas Mar 07, 20244 minsIntellectual PropertyTechnology Industry featureBeyond the table stakes: CISO Ian Schneller on cybersecurity's evolving roleBy Michael Bertha Mar 07, 20249 minsCSO and CISOCareers news analysisAttack targets Docker, Hadoop, Confluence, and Redis with new payloadsBy Lucian Constantin Mar 06, 20246 minsCryptocurrencyCyberattacksMalware Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI featureHow gen AI helps entry-level SOC analysts improve their skillsBy Maria Korolov Mar 05, 2024 14 minsGenerative AISecurity Operations Center newsCloudflare adds new WAF features to prevent hackers from exploiting LLMsBy Shweta Sharma Mar 04, 2024 3 minsGenerative AISecurity Software newsGenerative AI making big impact on security pros, to no one’s surpriseBy Jon Gold Feb 23, 2024 3 minsGenerative AICareers View topic Cybercrime news analysisNew Redis attack campaign weakens systems before deploying cryptominerBy Lucian Constantin Feb 20, 2024 6 minsCryptocurrencyCyberattacksMalware news analysisAttack campaign targeting Azure environments compromised hundreds of accountsBy Lucian Constantin Feb 14, 2024 4 minsPhishingCyberattacksCybercrime news analysisPhishing attack uses compromised SendGrid accounts to target additional usersBy Lucian Constantin Feb 08, 2024 5 minsPhishingEmail SecurityCybercrime View topic Careers featureThe CSO guide to top security conferencesBy CSO Staff Mar 01, 2024 20 minsTechnology IndustryIT SkillsEvents opinionThe death of the CIOBy Andy Ellis Feb 28, 2024 4 minsCSO and CISOCareersIT Leadership feature8 associations that women in cybersecurity should follow or joinBy Linda Rosencrance Feb 27, 2024 12 minsCSO and CISOHuman ResourcesSecurity Practices View topic IT Leadership feature30 years of the CISO role – how things have changed since Steve KatzBy Christine Wong Mar 04, 2024 9 minsCSO and CISOSecurity PracticesIT Leadership newsNew CISO appointments 2024By CSO Staff Feb 23, 2024 8 minsCSO and CISOIT JobsIT Governance opinionImproving cybersecurity culture: A priority in the year of the CISOBy Jon Oltsik Jan 30, 2024 5 minsCSO and CISOCareersIT Leadership View topic Upcoming Events12/Mar in-person event FutureIT Los Angeles: AI, data and tech leadership: Finding business value from emerging tech innovationsMar 12, 2024Los Angeles, CA Digital TransformationData and Information SecurityIT Leadership 11/Apr virtual event Data, Analytics & AI SummitApr 11, 2024Virtual Summit Data and Information Security 14/May in-person event FutureIT Boston 2024: AI, Data, & Tech LeadershipMay 14, 2024Boston, MA IT Leadership View all events Hear from the Experts featureBatten down the hatches: it’s time to harden every facet of your Windows networkGone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan BradleyNov 22, 20237 mins PhishingWindows SecurityNetwork Security Read the Article Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Fortinet Botnets: The uninvited guests that just won’t leave By Derek Manky, Chief Security Strategist & Global Vice President of Threat Intelligence, FortiGuard Labs Mar 08, 20246 mins Security brandpost Sponsored by Palo Alto Networks Watching the bottom line—How a Zero Trust position can save time and money By Navneet Singh, Vice President of Marketing, Network Security, Palo Alto Networks Mar 06, 20246 mins Security news Apple warns users against critical memory-corrupting attacks By Shweta Sharma Mar 06, 20242 mins Vulnerabilities podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO video CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO video Reaping the Benefits of Security Metrics Dec 21, 202321 mins CSO and CISO video Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data Dec 20, 202329 mins CSO and CISO