Latest from todayfeatureHow financial institutions can reduce security and other risks from MRAsHere's advice on avoiding breakdowns or inadequacies in a US financial institution's security and privacy policies and procedures that can trigger a matter requiring attention notice.By Perry Menezes, Partner/MD, Head, Financial Services, MorganFranklin Consulting; Ahsan Sheikh, CISRO, US Financial Services; Thomas Kartanowicz, CISO Europe and Americas, Global Financial Services Firm; Marco Maiurano, CISO, Large US Financial Services Firm; John Rogers, Global CISO, FinTech Firm; Paul Moreira, Global German Bank, Regional Head, Cyber, BCM, VRM, Operational resilienceAug 29, 202310 minsFinancial Services IndustryFinancial Services IndustryFinancial Services Industry feature How international cybersecurity frameworks can help CISOs By Rosalyn PageAug 28, 202311 minsCSO and CISOSecurity Practicesopinion Hacking the future: Notes from DEF CON's Generative Red Team ChallengeBy Christopher BurgessAug 28, 20235 minsHackingGenerative AISecurity news analysisNorth Korea's Lazarus Group hits organizations with two new RATsBy Lucian Constantin Aug 25, 20236 minsAdvanced Persistent ThreatsCyberattacksMalware featureTop cybersecurity M&A deals for 2023By CSO Staff Aug 25, 202322 minsMergers and AcquisitionsData and Information SecurityIT Leadership newsNIST publishes draft post-quantum cryptography standards, calls for industry feedbackBy Michael Hill Aug 24, 20233 minsEncryptionData and Information Security newsImmuniWeb releases Mobile Neuron to scan for OWASP Mobile Top 10 vulnerabilities, iOS/Android weaknessesBy Michael Hill Aug 24, 20233 minsMobile SecurityApplication SecurityVulnerabilities newsTrulioo enhances identity verification with “person match” intelligent routingBy Michael Hill Aug 24, 20232 minsAuthenticationIdentity Management Solutions newsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeBy Michael Hill Aug 24, 20232 minsHacker GroupsCybercrime Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI newsGenerative AI fueling significant rise in cyberattacksBy Michael Hill Aug 23, 2023 4 minsRansomwareRansomwareRansomware newseSentire introduces LLM Gateway to help businesses secure generative AIBy Michael Hill Aug 22, 2023 4 minsGenerative AIIT Governance FrameworksSecurity Monitoring Software opinionAre you prepared for the rise of the artificial intelligence CISO?By Christopher Whyte Aug 21, 2023 13 minsCSO and CISOGenerative AISecurity Practices View topic Cybercrime newsProxyjacking campaign LABRAT targets vulnerable GitLab deploymentsBy Lucian Constantin Aug 17, 2023 5 minsHackingGitLabNetwork Security feature6 best practices to defend against corporate account takeover attacksBy Linda Rosencrance Aug 17, 2023 10 minsBusinessBusinessBusiness newsReport: PowerShell Gallery susceptible to typosquatting and other package-management attacksBy Lucian Constantin Aug 16, 2023 9 minsDeveloperCyberattacksSupply Chain View topic Careers feature10 benefits of security performance metrics for CISOsBy Michael Hill Aug 22, 2023 7 minsCSO and CISOROI and MetricsIT Leadership featureTasks that bog down security teams (and what to do about them)By Mary K. Pratt Aug 21, 2023 13 minsCSO and CISOHuman ResourcesBusiness IT Alignment newsNew CISO appointments 2023By CSO Staff Aug 18, 2023 19 minsCSO and CISOCareersSecurity View topic IT Leadership brandpostSponsored by FortinetEffectively upskilling cybersecurity professionals to help close the skills gapBy Rob Rashotte Aug 14, 2023 5 minsIT Leadership featureWill CVSS 4.0 be a vulnerability-scoring breakthrough or is it broken?By Chris Hughes Aug 07, 2023 8 minsThreat and Vulnerability ManagementROI and MetricsVulnerabilities opinionCorporate boards take heed: Give CISOs the cold shoulder at your perilBy Christopher Burgess Jul 31, 2023 6 minsCSO and CISOCSO and CISOCSO and CISO View topic Upcoming Events20/Sep virtual summit CIO's Future of Work SummitSep 20, 2023Virtual CyberattacksEmployee ProtectionBusiness Operations 02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Where data, GenAI & cloud alignOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news Container security probes provide continuous penetration testing By Jon Gold Aug 23, 20233 mins DevSecOpsApplication Security news St Helens Council hit by suspected ransomware attack By Michael Hill Aug 23, 20233 mins RansomwareCyberattacksCybercrime news ISACA partners with Aston University to offer graduates cybersecurity credentials By Michael Hill Aug 23, 20233 mins CertificationsCareersSecurity podcast CSO Executive Sessions Australia with Eugene Ostapenko, Head of Information Security, Risk and Compliance at illion Australia and New Zealand Aug 28, 202327 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC Aug 23, 202321 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Eddie Hau on Sunway Group's cybersecurity strategy Aug 16, 202317 mins CSO and CISO video CSO Executive Sessions Australia with Eugene Ostapenko, Head of Information Security, Risk and Compliance at illion Australia and New Zealand Aug 28, 202325 mins CSO and CISO video CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC Aug 23, 202321 mins CSO and CISO video CSO Executive Sessions / ASEAN: Eddie Hau on Sunway Group's cybersecurity strategy Aug 16, 202317 mins CSO and CISO