Latest from todaynewsArm patches bugs in Mali GPUs that affect Android phones and ChromebooksThe vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta SharmaOct 03, 20233 minsAndroid SecurityAndroid SecurityMobile Security news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirementsBy Michael HillOct 03, 20234 minsRegulationComplianceVulnerabilitiesopinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness MonthBy Jon OltsikOct 03, 20234 minsCSO and CISOCareers featureThe value of threat intelligence — and challenges CISOs face in using it effectivelyBy Mary K. Pratt Oct 03, 202310 minsCSO and CISOAdvanced Persistent ThreatsThreat and Vulnerability Management newsMultibillion-dollar cybersecurity training market fails to fix the supply-demand imbalanceBy Samira Sarraf Oct 02, 20236 minsCSO and CISOTechnology IndustryIT Training newsRoyal family’s website suffers Russia-linked cyberattackBy Michael Hill Oct 02, 20232 minsDDoSCyberattacks feature10 things you should know about navigating the dark webBy Rosalyn Page Oct 02, 202313 minsCybercrimeSecurity newsShadowSyndicate Cybercrime gang has used 7 ransomware families over the past yearBy Lucian Constantin Oct 02, 20234 minsHacker GroupsRansomwareCybercrime newsUK data regulator orders end to spreadsheet FOI requests after serious data breachesBy Michael Hill Sep 29, 20233 minsGovernmentCybercrimeData and Information Security Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI brandpostSponsored by FortinetHow an integrated platform approach improves OT securityBy Richard Springer Sep 26, 2023 5 minsSecurity newsBaffle releases encryption solution to secure data for generative AIBy Michael Hill Sep 26, 2023 3 minsEncryptionGenerative AIData and Information Security newsCISOs are struggling to get cybersecurity budgets: ReportBy Shweta Sharma Sep 26, 2023 4 minsBudgetTechnology Industry View topic Cybercrime featureWhat is WorldCoin's proof-of-personhood system?By Matthew Tyson Sep 26, 2023 12 minsCryptocurrencyAuthenticationIdentity Management Solutions opinionPreparing for the post-quantum cryptography environment todayBy Christopher Burgess Sep 26, 2023 5 minsCSO and CISOEncryptionThreat and Vulnerability Management news analysisDHS unveils one common platform for reporting cyber incidentsBy Cynthia Brumfield Sep 25, 2023 10 minsRegulationGovernmentIncident Response View topic Careers newsChinese state actors behind espionage attacks on Southeast Asian governmentBy Shweta Sharma Sep 25, 2023 4 minsAdvanced Persistent ThreatsCyberattacks featureHow to pick the best endpoint detection and response solutionBy Linda Rosencrance Sep 25, 2023 10 minsIntrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security featureTop cybersecurity M&A deals for 2023By CSO Staff Sep 22, 2023 24 minsMergers and AcquisitionsData and Information SecurityIT Leadership View topic IT Leadership brandpostSponsored by SophosUnmasking ransomware threat clusters: Why it matters to defenders Sep 21, 2023 3 minsCybercrime news analysisChina's offensive cyber operations support "soft power" agenda in AfricaBy Michael Hill Sep 21, 2023 5 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure brandpostSponsored by TXOne NetworksProactive OT security requires visibility + preventionBy Austen Byers, Technical Director at TXOne Networks Sep 21, 2023 4 minsSecurity View topic Upcoming Events11/Oct virtual summit AI Leadership Summit: Data-driven Leadership & GenAIOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security 08/Nov in-person event FutureIT New York - AI, Data and Tech Leadership: Finding business value from emerging tech innovationsNov 08, 2023New York, NY Digital TransformationData and Information SecurityIT Leadership 07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news UK businesses face tightening cybersecurity budgets as incidents spike By Michael Hill Oct 03, 20233 mins CSO and CISORisk Management news CIISec secures government funding to expand CyberEPQ program By Michael Hill Oct 03, 20233 mins IT Training CareersSecurity news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity By Michael Hill Sep 29, 20234 mins Education IndustryGovernmentSecurity Practices podcast CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks Oct 02, 202314 mins CSO and CISO podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO video CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks Oct 02, 202314 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security