featureCybersecurity startups to watch in 2023These startups are jumping in where most established security vendors have yet to go.By CSO StaffNov 24, 202323 minsCSO and CISOSecurity brandpostSponsored by CyberArk Cloud identity security success: 3 critical factorsBy Yonatan Klein, director of product management, Cloud Security, at CyberArkNov 20, 20235 minsSecuritybrandpostSponsored by CyberArk Identity security’s crucial role in safeguarding data privacyBy Lilach Faerman Koren, product marketing manager at CyberArk.Nov 20, 20238 minsSecurity opinionWhy the DOD's Replicator should be a model for cybersecurityBy Christopher Whyte Nov 20, 202312 minsCSO and CISOSecurity featureTop cybersecurity M&A deals for 2023By CSO Staff Nov 17, 202329 minsMergers and AcquisitionsData and Information SecurityIT Leadership newsTop cybersecurity product news of the weekBy CSO staff Nov 16, 202312 minsGenerative AISecurity brandpostSponsored by FortinetVeterans play a crucial role in filling the cybersecurity skills gapBy Rob Rashotte Nov 15, 20236 minsSecurity newsFor top cybersecurity talent, companies pay over $500,000: ReportBy Jon Gold Nov 15, 20233 minsIT StrategyIT StrategyIT Strategy brandpostSponsored by Palo Alto NetworksCode-to-cloud: Achieving complete cloud securityBy Ankur Shah, SVP and GM of Prisma Cloud at Palo Alto Networks Nov 14, 20235 minsSecurity ArticlesnewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold Oct 23, 2023 3 minsDDoSDDoSDDoSbrandpostSponsored by Microsoft SecurityThis Cybersecurity Awareness Month, the focus is on educationRead on to learn more about how you can better educate your organization on the fundamental elements of cybersecurity and take the next step for cyber resilience.By Microsoft Security Oct 23, 2023 5 minsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore Oct 23, 2023 6 minsSecuritybrandpostSponsored by CyberArkEngaging insiders to combat insider threatsThere’s no silver bullet for insider threat protection; however, a greater focus on culture, engagement and empowerment can make a real difference.By Omer Grossman, global chief information officer at CyberArk Oct 19, 2023 6 minsSecuritybrandpostSponsored by CyberArkThe MGM Resorts attack: initial analysisThe recent cyberattack on MGM Resorts provides a useful case study on security best practices in today’s digital landscape.By Andy Thompson, Offensive Research Evangelist at CyberArk Labs Oct 19, 2023 9 minsSecuritybrandpostSponsored by CyberArk6 essential steps for identity security in multi-cloud environmentsCyberArk’s Insight to Action framework helps address this gap between detection and remediation and offers a deep dive into six pivotal areas recognized as substantial threats in the cloud environment.By Paddy Viswanathan, vice president of Cloud Solution Strategy at CyberArk Oct 19, 2023 10 minsSecuritybrandpostSponsored by FortinetPhishing emails are more believable than ever. Here’s what to do about it.Because most ransomware is delivered through phishing, employee education is essential to protecting your organization from these threats.By Derek Manky and Rob Rashotte Oct 18, 2023 5 minsSecurityfeatureBeware the cost traps that can strain precious cybersecurity budgetsSecurity investments can come with hidden costs that aren’t always obvious but eat into security leaders’ funds without them ever realizingBy Michael Hill Oct 16, 2023 11 minsCSO and CISOBudgetSecurity PracticesbrandpostSponsored by Microsoft SecurityImprove your cyber threat understanding with geopolitical contextThis strategic analysis of international cyber threat activity is critical for protecting vulnerable audiences who may become the target of future attacks.By Microsoft Security Oct 15, 2023 5 minsSecuritynewsGenerative AI is scaring CISOs – but adoption isn’t slowing downIncluding security concerns at the beginning of any generative AI adoption discussion is key, but meanwhile the good news is cybersecurity budgets for AI are rising.By Jon Gold Oct 12, 2023 3 minsBudgetGenerative AISecuritybrandpostSponsored by Palo Alto NetworksHow this year’s Black Hat NOC leveraged AI to defend the eventOur industry has no choice but to embrace and leverage AI to fight constant threats if we are to stand any hope of defending our environments effectively.By Henry Hernandez, Consulting Engineer at Palo Alto Networks Oct 12, 2023 4 minsSecurityfeatureThe undeniable benefits of making cyber resiliency the new standardEnterprise leaders are looking beyond defensive security postures to ensure their organizations are resilient in the face of a cyber event. Here’s how they think about, measure and report on resiliency.By Mary K. Pratt Oct 10, 2023 11 minsCSO and CISORisk ManagementSecurity Practices Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Watch the "Cyber Risk is a Business Risk Keynote" Video Dive into the dynamic intersection of cybersecurity and business risk in this insightful keynote replay. The post Watch the “Cyber Risk is a Business Risk Keynote” Video appeared first on Whitepaper Repository. By Trend Micro 28 Nov 2023CybercrimeData and Information SecuritySecurity whitepaper Stay Secure: Get the top ransomware insights now By Trend Micro 28 Nov 2023Business OperationsCyberattacksSecurity whitepaper Read Omdia's Public Vulnerability Report Available Now By Trend Micro 28 Nov 2023Business OperationsData and Information SecuritySecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Amazon’s AWS Control Tower aims to help secure your data’s borders By Jon Gold Nov 28, 20233 mins RegulationRegulationGovernment news North Korean hackers mix code from proven malware campaigns to avoid detection By Shweta Sharma Nov 28, 20233 mins Malware feature How a digital design firm navigated its SOC 2 audit By Alex Levin Nov 28, 202311 mins CertificationsCompliance podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO