news analysisDeepfakes emerge as a top security threat ahead of the 2024 US electionAs the US enters a critical election year, AI-generated threats, particularly deepfakes, are emerging as a top security issue, with no reliable tools yet in place to combat them.By Cynthia Brumfield05 Dec 20237 minsElection HackingGovernmentSecurity Practices news analysis P2Pinfect Redis worm targets IoT with version for MIPS devicesBy Lucian Constantin04 Dec 20235 minsBotnetsHacker GroupsSecurity Practicesopinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurityBy Cameron Dicker04 Dec 20236 minsFinancial Services IndustryData and Information SecuritySecurity Practices featureThe CSO guide to top security conferencesBy CSO Staff 01 Dec 20236 minsTechnology IndustryIT SkillsEvents newsTop cybersecurity product news of the weekBy CSO staff 30 Nov 202317 minsGenerative AISecurity newsAlmost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr. 29 Nov 20234 minsDevelopment ToolsSecurity PracticesSupply Chain feature3 ways to fix old, unsafe code that lingers from open-source and legacy programsBy Maria Korolov 29 Nov 20239 minsSecurity PracticesVulnerabilitiesSecurity featureCybersecurity startups to watch in 2023By CSO Staff 24 Nov 202323 minsCSO and CISOCSO and CISOC-Suite opinionWhy the DOD's Replicator should be a model for cybersecurityBy Christopher Whyte 20 Nov 202312 minsCSO and CISOSecurity ArticlesbrandpostSponsored by Palo Alto NetworksStreamlining security platforms for faster implementation and enhanced risk resolution CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue.By Haider Pasha, Senior Director and Chief Security Officer 24 Oct 2023 5 minsSecuritybrandpostSponsored by TXOne NetworksThe rise of the cybersecurity insurance marketMitigating ransomware threats and shaping the future of cybersecurity insurance in OT environments.By TXOne 24 Oct 2023 5 minsSecuritybrandpostSponsored by DevoHow a cloud-native SIEM provides an AI-powered alternative to legacy systemsPicture this: a world where AI-enabled threat actors are launching relentless and sophisticated attacks against enterprises and critical infrastructure. By Devo 24 Oct 2023 4 minsSecuritynewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold 23 Oct 2023 3 minsDDoSHacker GroupsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore 23 Oct 2023 6 minsSecuritybrandpostSponsored by FortinetPhishing emails are more believable than ever. Here’s what to do about it.Because most ransomware is delivered through phishing, employee education is essential to protecting your organization from these threats.By Derek Manky and Rob Rashotte 18 Oct 2023 5 minsSecurityfeatureBeware the cost traps that can strain precious cybersecurity budgetsSecurity investments can come with hidden costs that aren’t always obvious but eat into security leaders’ funds without them ever realizingBy Michael Hill 16 Oct 2023 11 minsCSO and CISOBudgetSecurity PracticesnewsGenerative AI is scaring CISOs – but adoption isn’t slowing downIncluding security concerns at the beginning of any generative AI adoption discussion is key, but meanwhile the good news is cybersecurity budgets for AI are rising.By Jon Gold 12 Oct 2023 3 minsBudgetGenerative AISecuritybrandpostSponsored by Palo Alto NetworksHow this year’s Black Hat NOC leveraged AI to defend the eventOur industry has no choice but to embrace and leverage AI to fight constant threats if we are to stand any hope of defending our environments effectively.By Henry Hernandez, Consulting Engineer at Palo Alto Networks 12 Oct 2023 4 minsSecurityfeatureThe undeniable benefits of making cyber resiliency the new standardEnterprise leaders are looking beyond defensive security postures to ensure their organizations are resilient in the face of a cyber event. Here’s how they think about, measure and report on resiliency.By Mary K. Pratt 10 Oct 2023 11 minsCSO and CISORisk ManagementSecurity Practicesfeature11 notable post-quantum cryptography initiatives launched in 2023With “Q-Day” in the foreseeable future, the security community is working towards cryptographic encryption that can withstand post-quantum threatsBy Michael Hill 09 Oct 2023 10 minsThreat and Vulnerability ManagementThreat and Vulnerability ManagementThreat and Vulnerability ManagementnewsOkta launches Cybersecurity Workforce Development InitiativeNew philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers.By Michael Hill 04 Oct 2023 3 minsIT SkillsIT SkillsIT Skills Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity whitepaper Regional Trends Around Password Management By LastPass 05 Apr 2023Password ManagersSecuritySecurity Practices View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte 05 Dec 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management news Hackers book profit by scamming Booking.com customers By Gagandeep Kaur 04 Dec 20234 mins Cyberattacks podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO