Latest from todaynewsMedusa group steps up ransomware activitiesNew extortion site offers victims, many of which are in the healthcare sector, multiple ways to pay ransoms.By John Mello Jr.Jan 12, 20244 minsRansomwareCybercrime news analysis Researchers demo new CI/CD attack techniques in PyTorch supply-chainBy Lucian ConstantinJan 12, 202411 minsSupply ChainVulnerabilitiesnews CISA adds patched MS SharePoint server vulnerability to KEV catalogBy Shweta SharmaJan 12, 20242 minsVulnerabilities news analysisAttackers deploy rootkits on misconfigured Apache Hadoop and Flink serversBy Lucian Constantin Jan 11, 20245 minsCyberattacksMalwareCybercrime newsChinese hackers exploit Ivanti VPN zero days for RCE attacksBy Shweta Sharma Jan 11, 20243 minsZero-day vulnerability newsTop cybersecurity product news of the weekBy CSO staff Jan 11, 202434 minsGenerative AISecurity news analysisMirai-based NoaBot botnet deploys cryptominer on Linux serversBy Lucian Constantin Jan 10, 20246 minsBotnetsCyberattacksMalware newsTurkish ransomware campaign hacks into weak MSSQL servers: reportBy Shweta Sharma Jan 10, 20244 minsRansomware feature12 best cybersecurity podcasts as recommended by the professionals By Linda Rosencrance Jan 10, 202412 minsCSO and CISOSecurity PracticesIT Leadership Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI featureIf you don’t already have a generative AI security policy, there’s no time to loseBy Michael Hill Dec 27, 2023 14 minsGenerative AIData and Information SecuritySecurity Practices news analysisMLflow vulnerability enables remote machine learning model theft and poisoningBy Lucian Constantin Dec 21, 2023 6 minsGenerative AIVulnerabilities news analysis2024 US NDAA boosts nuclear cybersecurity, highlights artificial intelligenceBy Cynthia Brumfield Dec 18, 2023 8 minsMilitaryGenerative AICritical Infrastructure View topic Cybercrime newsHybrid online frauds likely to gain momentum in 2024: ReportBy Gagandeep Kaur Dec 21, 2023 3 minsCybercrime newsMicrosoft cracks down on group operating ‘cybercrime-as-a-service’By Prasanth Aby Thomas Dec 14, 2023 3 minsCybercrime news analysisRansomware gang files SEC complaint against company that refused to negotiateBy Lucian Constantin Nov 17, 2023 4 minsRansomwareComplianceCybercrime View topic Careers featureThe CSO guide to top security conferencesBy CSO Staff Dec 29, 2023 22 minsTechnology IndustryIT SkillsEvents featureHow cybersecurity roles are changing and what to look for when hiringBy Aimee Chanthadavong Dec 19, 2023 9 minsCSO and CISOCareers newsNew CISO appointments 2023By CSO Staff Dec 08, 2023 28 minsCSO and CISOCareersSecurity View topic IT Leadership opinionWhy 2024 will be the year of the CISOBy Jon Oltsik Dec 21, 2023 8 minsCSO and CISORegulationIT Leadership featureTop cybersecurity M&A deals for 2023By CSO Staff Dec 15, 2023 32 minsMergers and AcquisitionsData and Information SecurityIT Leadership brandpostSponsored by Palo Alto NetworksAddressing the cyber skills shortage: 5 key steps to takeBy Leonard Kleinman Oct 24, 2023 7 minsIT Leadership View topic Hear from the Experts opinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Fortinet Stronger together: Creating a cyber-secure community By Rob Rashotte, vice president of global training and technical field enablement, Fortinet Jan 04, 20245 mins Security brandpost Sponsored by Fortinet The MVPs of the APT game By Derek Manky, Chief Security Strategist & Global VP Threat Intelligence, FortiGuard Labs Jan 04, 20245 mins Security news SonicWall buys up SSE startup to accelerate SASE offerings By Shweta Sharma Jan 04, 20243 mins Zero TrustMergers and AcquisitionsSecurity podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video Reaping the Benefits of Security Metrics Dec 21, 202321 mins CSO and CISO video Don’t Lose Your Focus: It’s Not About the AI; It’s About the Data Dec 20, 202329 mins CSO and CISO video Preventing the Cracks from Becoming a Hole that Becomes a Crater Dec 19, 202326 mins CSO and CISO