Latest from todayfeature3 strategies that can help stop ransomware before it becomes a crisisFor those hoping to avoid the pay-or-not-to-pay ransomware dilemma, there are three things to focus on that can help CISOs: create incident response plans, improve cybersecurity posture, and invest in robust backups.By Maria KorolovAug 16, 202313 minsRansomwareRansomwareRansomware news MongoDB rolls out Queryable Encryption to secure sensitive data workflowsBy Michael HillAug 15, 20234 minsEncryptionCloud SecurityData and Information Securitynews UK police data breach exposes victim informationBy Michael HillAug 15, 20233 minsData BreachIdentity TheftLegal newsEmail phishing still the main way in for hackers: reportBy Jon Gold Aug 15, 20233 minsEmail SecurityPhishing feature15 top open-source intelligence toolsBy Josh Fruhlinger, Ax Sharma and John Breeden Aug 15, 202321 minsVulnerabilitiesOpen SourceSecurity opinionCybersecurity hiring gap: Time to rethink who can contributeBy Christopher Burgess Aug 15, 20237 minsCSO and CISOCareers feature10 passwordless authentication solutionsBy Tim Ferrill Aug 14, 20239 minsMulti-factor AuthenticationPasswordsPassword Managers news analysisMultiple data center vulnerabilities could cripple cloud servicesBy Michael Hill Aug 12, 20236 minsCloud SecurityVulnerabilities news analysisMicrosoft demonstrates remote code execution exploit against PLCs that support CODESYS By Lucian Constantin Aug 11, 20236 minsCritical InfrastructureVulnerabilities Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI news analysisMost businesses to ban ChatGPT, generative AI apps on work devicesBy Michael Hill Aug 08, 2023 3 minsCSO and CISOGenerative AIRisk Management featureHow LLMs are making red and blue teams more efficientBy Andrada Fiscutean Aug 08, 2023 8 minsGenerative AIPenetration Testing newsUK calls artificial intelligence a "chronic risk" to its national securityBy Michael Hill Aug 03, 2023 4 minsGenerative AICritical Infrastructure View topic Cybercrime news analysisAttackers use Cloudflare Tunnel to proxy into victim networksBy Lucian Constantin Aug 08, 2023 6 minsCyberattacksCloud SecurityNetwork Security newsUK election watchdog failed to discover system hack for 15 monthsBy Charlotte Trueman Aug 08, 2023 3 minsData BreachElection Hacking newsNorth Korea hacked into Russian missile company: ReportBy Shweta Sharma Aug 08, 2023 4 minsData BreachSurveillance View topic Careers featureCybersecurity startups to watch for in 2023By CSO Staff Aug 04, 2023 17 minsCSO and CISOSecurity featureWhen your teammate is a machine: 8 questions CISOs should be asking about AIBy Christopher Burgess Aug 03, 2023 9 minsCSO and CISOGenerative AIData and Information Security opinionCorporate boards take heed: Give CISOs the cold shoulder at your perilBy Christopher Burgess Jul 31, 2023 6 minsCSO and CISOC-SuiteIT Director View topic IT Leadership featureWill CVSS 4.0 be a vulnerability-scoring breakthrough or is it broken?By Chris Hughes Aug 07, 2023 8 minsThreat and Vulnerability ManagementROI and MetricsVulnerabilities featureTop cybersecurity M&A deals for 2023By CSO Staff Jul 28, 2023 18 minsMergers and AcquisitionsData and Information SecurityIT Leadership opinionHas generative AI quietly ushered in a new era of shadow IT on steroids?By Dan Lohrmann Jul 25, 2023 8 minsCSO and CISOGenerative AIData and Information Security View topic Upcoming Events20/Sep virtual summit CIO's Future of Work SummitSep 20, 2023Virtual CyberattacksEmployee ProtectionBusiness Operations 02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Where data, GenAI & cloud alignOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news Victoria public agencies fail to make full use of Microsoft 365 identity controls By Samira Sarraf Aug 16, 20235 mins Government ITIdentity and Access Management brandpost The challenge of managing unlimited threats in a limited budget: cyber security experts comment By Rapid7 Aug 14, 20235 mins CybercrimeStorage Security news Google readies Chrome for distant quantum attacks with new support By Shweta Sharma Aug 14, 20233 mins Browser SecurityEncryption podcast CSO Executive Sessions / ASEAN: Frankie Shuai on generative AI in cybersecurity Aug 09, 202313 mins CSO and CISO podcast CSO Executive Sessions Australia with Raheem SAR, APAC Region Manager – Information Security & Compliance at The Access Group Aug 07, 202319 mins CSO and CISO podcast CSO Executive Sessions Australia with Murray Wayper, CISO at Biza Aug 03, 202312 mins CSO and CISO video CSO Executive Sessions / ASEAN: Frankie Shuai on generative AI in cybersecurity Aug 09, 202313 mins CSO and CISO video CSO Executive Sessions Australia with Raheem SAR, APAC Region Manager – Information Security & Compliance at The Access Group Aug 07, 202319 mins CSO and CISO video CSO Executive Sessions Australia with Murray Wayper, CISO at Biza Aug 03, 202312 mins CSO and CISO