Latest from todaynewsDependencies in LLM packages open apps to vulnerabilities: ReportOpen-source packages with large language model (LLM) capabilities have many dependencies that make calls to security-sensitive APIs, according to a new Endor Labs report.By Shweta SharmaJul 19, 20235 minsDevSecOpsDevSecOpsThreat and Vulnerability Management news Chainguard adds automated SBOMs, vulnerability scanning to Enforce By Shweta SharmaJul 19, 20233 minsApplication Securitynews Initial access broker posts targeting banks increase on dark webBy Apurva VenkatJul 19, 20234 minsFinancial Services IndustryCybercrimeNetwork Security featureWhy and how CISOs should work with lawyers to address regulatory burdensBy Rosalyn Page Jul 19, 202311 minsRegulationComplianceRisk Management news analysisAttackers can abuse Google Cloud Build to poison production environmentsBy Lucian Constantin Jul 18, 20237 minsCloud SecurityVulnerabilities news analysisHouse-passed US 2024 defense bill contains $13.5 billion for cyberspace activitiesBy Cynthia Brumfield Jul 18, 20238 minsMilitaryGovernmentCritical Infrastructure newsEnterprises aren’t betting big on API controls yet, says studyBy Shweta Sharma Jul 18, 20233 minsAPIsCloud Security newsOnly half of organizations “very prepared” to meet global data privacy lawsBy Michael Hill Jul 18, 20238 minsRegulationData PrivacyCompliance newsWormGPT: a generative AI tool to compromise business emailsBy Apurva Venkat Jul 17, 20234 minsEmail SecurityGenerative AI Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI news analysis7 most likely generative AI business use cases and their security risksBy Michael Hill Jul 13, 2023 4 minsGenerative AIRisk Management opinionThe psychological and strategic challenges posed by AI-enhanced cyberattacks and influence campaignsBy Christopher Whyte Jul 13, 2023 11 minsAdvanced Persistent ThreatsCyberattacksGenerative AI opinionHow generative AI can help organizations overcome threat intelligence program challengesBy Jon Oltsik Jul 10, 2023 5 minsGenerative AIThreat and Vulnerability Management View topic Cybercrime news analysisUS government stresses audit logging importance in wake of Chinese APT intrusionsBy Cynthia Brumfield Jul 13, 2023 6 minsAdvanced Persistent ThreatsEmail SecurityVulnerabilities newsDeutsche Bank customer data exposed in latest MOVEit exploitBy Apurva Venkat Jul 13, 2023 3 minsData BreachCyberattacksVulnerabilities newsRansomware attacks cost financial organizations US$32.3 billion in downtime since 2018By Michael Hill Jul 13, 2023 3 minsRansomwareFinancial Services Industry View topic Careers newsEvolving web applications raise security concerns, push budgetsBy Shweta Sharma Jul 12, 2023 3 minsCSO and CISOApplication Security feature5 ways to prepare a new cybersecurity team for a crisisBy Jaikumar Vijayan Jul 10, 2023 9 minsIncident ResponseIT Training featureCybersecurity startups to watch for in 2023By CSO Staff Jul 07, 2023 14 minsCSO and CISOSecurity View topic IT Leadership newsTrustCloud adds new tools to automate GRC frameworksBy Shweta Sharma Jul 06, 2023 3 minsIT Governance FrameworksCompliance featureWhy cyberpsychology is such an important part of effective cybersecurityBy Mary K. Pratt Jul 04, 2023 12 minsPhishingCyberattacksHuman Resources featureHow CISOs can make themselves ready to serve on the boardBy Ericka Chickowski Jul 03, 2023 12 minsCareersIT Leadership View topic Upcoming Events14/Aug-16/Aug awards CIO 100 Symposium & AwardsAug 14, 2023Rancho Palos Verdes, CA C-SuiteIT LeadershipSecurity 20/Sep virtual summit CIO's Future of Work SummitSep 20, 2023Virtual CyberattacksEmployee ProtectionBusiness Operations 02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article by Christopher Burgess Contributing Writer Show me moreLatestArticlesPodcastsVideos news Industry groups call for changes to EU Cyber Resiliency Act By Michael Hill Jul 13, 20236 mins RegulationComplianceSecurity brandpost AI and privacy: safeguarding your personal information in an age of intelligent systems By CSO Contributor Jul 13, 20234 mins Internet SecurityPrivacy brandpost Why data removal services are vital to maintain privacy amid rising cyber crime By CSO Contributor Jul 13, 20234 mins CybercrimePrivacy podcast CSO Executive Sessions Australia with Simona Dimovski, CISO at Helia Jul 17, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Chris Mace, CISO for the New South Wales Public Service Commission Jul 10, 20239 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Hieu Minh Ngo on top cybersecurity vulnerabilities to watch out for Jul 10, 202316 mins CyberattacksCybercrime video CSO Executive Sessions Australia with Simona Dimovski, CISO at Helia Jul 17, 202315 mins CSO and CISO video CSO Executive Sessions Australia with Chris Mace, CISO for the New South Wales Public Service Commission Jul 10, 20239 mins CSO and CISO video CSO Executive Sessions with Daniela Fernandez, Head of Information Security for PayPal Australia Jul 07, 202315 mins CSO and CISO