Latest from todayfeatureHow to pick the best endpoint detection and response solutionEDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software.By Linda RosencranceSep 25, 202310 minsIntrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security feature Top cybersecurity M&A deals for 2023By CSO StaffSep 22, 202324 minsMergers and AcquisitionsData and Information SecurityIT Leadershipfeature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities reportBy Chris HughesSep 21, 20238 minsZero TrustThreat and Vulnerability ManagementSecurity Practices feature4 steps for purple team successBy Maril Vernon Sep 20, 20237 minsPenetration TestingThreat and Vulnerability Management feature6 notable API security initiatives launched in 2023By Michael Hill Sep 19, 20237 minsApplication SecurityCloud SecuritySecurity Practices featureShelter from the storm – lessons learned from the Storm-0558 Microsoft email attacksBy Susan Bradley Sep 18, 20236 minsCSO and CISOEmail SecurityCyberattacks featureThe biggest data breach fines, penalties, and settlements so farBy Michael Hill Sep 18, 202314 minsData BreachSecurity opinion10 principles to ensure strong cybersecurity in agile developmentBy Steve Durbin Sep 14, 20236 minsDevSecOpsAgile DevelopmentSecurity Practices featureSecurity and privacy laws, regulations, and compliance: The complete guideBy CSO Staff Sep 12, 202349 minsRegulationComplianceSecurity Top Award winners # Name Brand, Company Title 01Brad Arkin Cisco Senior Vice President, Chief Security and Trust Officer02Steve Bader Community Healthcare System Director of Technical Services and Interim ISO03Gregory Barnes Amgen Global CISO04Shawn Bowen World Fuel Services CISO See all winners Hear from the Experts Being able to lead talent and entice them to 'think' like a digital entrepreneur is where the CSO's focus should be. Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 11/Oct virtual summit AI Leadership Summit: Data-driven Leadership & GenAIOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security 08/Nov in-person event FutureIT New York - AI, Data and Tech Leadership: Finding business value from emerging tech innovationsNov 08, 2023New York, NY Digital TransformationData and Information SecurityIT Leadership View all events Hear from our experts Andrada Fiscutean Freelance writer Rosalyn Page Contributing Writer David Finger Cynthia Brumfield Contributing Writer Christopher Burgess Contributing Writer Chris Hughes Contributing Writer Andrada Fiscutean Freelance writer Shweta Sharma Senior Writer Jon Gold Senior writer Apurva Venkat Special Correspondent Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security What is inside a hacker's backpack? Sep 06, 2023 33 minsHackingCybercrime Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime Why the digital security system is broken Sep 05, 2023 45 minsMulti-factor AuthenticationAuthenticationEncryption See all videos