Latest from todayfeatureHow international cybersecurity frameworks can help CISOs International cybersecurity agreements can guide CISOs when cross border collaboration is needed but these agreements are not enough to protect enterprises alone.By Rosalyn PageAug 28, 202311 minsCSO and CISOSecurity Practices opinion Hacking the future: Notes from DEF CON's Generative Red Team ChallengeBy Christopher BurgessAug 28, 20235 minsHackingGenerative AISecuritynews analysis North Korea's Lazarus Group hits organizations with two new RATsBy Lucian ConstantinAug 25, 20236 minsAdvanced Persistent ThreatsCyberattacksMalware featureTop cybersecurity M&A deals for 2023By CSO Staff Aug 25, 202322 minsMergers and AcquisitionsData and Information SecurityIT Leadership newsNIST publishes draft post-quantum cryptography standards, calls for industry feedbackBy Michael Hill Aug 24, 20233 minsEncryptionData and Information Security newsImmuniWeb releases Mobile Neuron to scan for OWASP Mobile Top 10 vulnerabilities, iOS/Android weaknessesBy Michael Hill Aug 24, 20233 minsMobile SecurityApplication SecurityVulnerabilities newsTrulioo enhances identity verification with “person match” intelligent routingBy Michael Hill Aug 24, 20232 minsAuthenticationIdentity Management Solutions newsUK court finds teenagers guilty of carrying out LAPSUS$ hacking spreeBy Michael Hill Aug 24, 20232 minsHacker GroupsCybercrime newsSpecialized third-party solutions prove effective against malicious bots, ATO attacks, script risksBy Michael Hill Aug 24, 20235 minsBotnetsCyberattacksFraud Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI newsGenerative AI fueling significant rise in cyberattacksBy Michael Hill Aug 23, 2023 4 minsRansomwareCyberattacksGenerative AI newseSentire introduces LLM Gateway to help businesses secure generative AIBy Michael Hill Aug 22, 2023 4 minsGenerative AIIT Governance FrameworksSecurity Monitoring Software opinionAre you prepared for the rise of the artificial intelligence CISO?By Christopher Whyte Aug 21, 2023 13 minsCSO and CISOGenerative AISecurity Practices View topic Cybercrime newsProxyjacking campaign LABRAT targets vulnerable GitLab deploymentsBy Lucian Constantin Aug 17, 2023 5 minsHackingGitLabNetwork Security feature6 best practices to defend against corporate account takeover attacksBy Linda Rosencrance Aug 17, 2023 10 minsBusinessCyberattacksCybercrime newsReport: PowerShell Gallery susceptible to typosquatting and other package-management attacksBy Lucian Constantin Aug 16, 2023 9 minsDeveloperCyberattacksSupply Chain View topic Careers feature10 benefits of security performance metrics for CISOsBy Michael Hill Aug 22, 2023 7 minsCSO and CISOROI and MetricsIT Leadership featureTasks that bog down security teams (and what to do about them)By Mary K. Pratt Aug 21, 2023 13 minsCSO and CISOHuman ResourcesBusiness IT Alignment newsNew CISO appointments 2023By CSO Staff Aug 18, 2023 19 minsCSO and CISOCareersSecurity View topic IT Leadership brandpostSponsored by FortinetEffectively upskilling cybersecurity professionals to help close the skills gapBy Rob Rashotte Aug 14, 2023 5 minsIT Leadership featureWill CVSS 4.0 be a vulnerability-scoring breakthrough or is it broken?By Chris Hughes Aug 07, 2023 8 minsThreat and Vulnerability ManagementROI and MetricsVulnerabilities opinionCorporate boards take heed: Give CISOs the cold shoulder at your perilBy Christopher Burgess Jul 31, 2023 6 minsCSO and CISOC-SuiteIT Director View topic Upcoming Events20/Sep virtual summit CIO's Future of Work SummitSep 20, 2023Virtual CyberattacksEmployee ProtectionBusiness Operations 02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Where data, GenAI & cloud alignOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security View all events The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Hear from the Experts opinionThe CISO's toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher BurgessJun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos news St Helens Council hit by suspected ransomware attack By Michael Hill Aug 23, 20233 mins RansomwareCyberattacksCybercrime news ISACA partners with Aston University to offer graduates cybersecurity credentials By Michael Hill Aug 23, 20233 mins CertificationsCareersSecurity feature How API authentication vulnerabilities are at the center of cloud security concerns By Susan Bradley Aug 23, 20236 mins AuthenticationCloud SecurityAPIs podcast CSO Executive Sessions Australia with Eugene Ostapenko, Head of Information Security, Risk and Compliance at illion Australia and New Zealand Aug 28, 202327 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC Aug 23, 202321 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Eddie Hau on Sunway Group's cybersecurity strategy Aug 16, 202317 mins CSO and CISO video CSO Executive Sessions Australia with Eugene Ostapenko, Head of Information Security, Risk and Compliance at illion Australia and New Zealand Aug 28, 202325 mins CSO and CISO video CSO Executive Sessions / ASEAN: IDC's Christian Fam on the state of digital trust in APAC Aug 23, 202321 mins CSO and CISO video CSO Executive Sessions / ASEAN: Eddie Hau on Sunway Group's cybersecurity strategy Aug 16, 202317 mins CSO and CISO