news analysisP2Pinfect Redis worm targets IoT with version for MIPS devicesNew versions of the worm include some novel approaches to infecting routers and internet-of-things devices, according to a report by Cado Security.By Lucian ConstantinDec 04, 20235 minsBotnetsHacker GroupsSecurity Practices opinion Proactive, not reactive: the path to ensuring operational resilience in cybersecurityBy Cameron DickerDec 04, 20236 minsFinancial Services IndustryData and Information SecuritySecurity Practicesfeature The CSO guide to top security conferencesBy CSO StaffDec 01, 20236 minsTechnology IndustryIT SkillsEvents newsTop cybersecurity product news of the weekBy CSO staff Nov 30, 202317 minsGenerative AISecurity newsAlmost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr. Nov 29, 20234 minsDevelopment ToolsSecurity PracticesSupply Chain feature3 ways to fix old, unsafe code that lingers from open-source and legacy programsBy Maria Korolov Nov 29, 20239 minsSecurity PracticesVulnerabilitiesSecurity featureCybersecurity startups to watch in 2023By CSO Staff Nov 24, 202323 minsCSO and CISOCSO and CISOC-Suite brandpostSponsored by CyberArkCloud identity security success: 3 critical factorsBy Yonatan Klein, director of product management, Cloud Security, at CyberArk Nov 20, 20235 minsSecurity brandpostSponsored by CyberArkIdentity security’s crucial role in safeguarding data privacyBy Lilach Faerman Koren, product marketing manager at CyberArk. Nov 20, 20238 minsSecurity ArticlesbrandpostSponsored by Palo Alto NetworksCSO- AI’s Impact on Cybersecurity It’s on everyone’s mind: How will AI benefit threat actors?By Michael "Siko" Sikorski with David Moulton Oct 25, 2023 3 minsCyberattacksSecuritybrandpostSponsored by Palo Alto NetworksStreamlining security platforms for faster implementation and enhanced risk resolution CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue.By Haider Pasha, Senior Director and Chief Security Officer Oct 24, 2023 5 minsSecuritybrandpostSponsored by TXOne NetworksThe rise of the cybersecurity insurance marketMitigating ransomware threats and shaping the future of cybersecurity insurance in OT environments.By TXOne Oct 24, 2023 5 minsSecuritybrandpostSponsored by DevoHow a cloud-native SIEM provides an AI-powered alternative to legacy systemsPicture this: a world where AI-enabled threat actors are launching relentless and sophisticated attacks against enterprises and critical infrastructure. By Devo Oct 24, 2023 4 minsSecuritynewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold Oct 23, 2023 3 minsDDoSHacker GroupsSecuritybrandpostSponsored by Microsoft SecurityThis Cybersecurity Awareness Month, the focus is on educationRead on to learn more about how you can better educate your organization on the fundamental elements of cybersecurity and take the next step for cyber resilience.By Microsoft Security Oct 23, 2023 5 minsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore Oct 23, 2023 6 minsSecuritybrandpostSponsored by CyberArkEngaging insiders to combat insider threatsThere’s no silver bullet for insider threat protection; however, a greater focus on culture, engagement and empowerment can make a real difference.By Omer Grossman, global chief information officer at CyberArk Oct 19, 2023 6 minsSecuritybrandpostSponsored by CyberArkThe MGM Resorts attack: initial analysisThe recent cyberattack on MGM Resorts provides a useful case study on security best practices in today’s digital landscape.By Andy Thompson, Offensive Research Evangelist at CyberArk Labs Oct 19, 2023 9 minsSecuritybrandpostSponsored by CyberArk6 essential steps for identity security in multi-cloud environmentsCyberArk’s Insight to Action framework helps address this gap between detection and remediation and offers a deep dive into six pivotal areas recognized as substantial threats in the cloud environment.By Paddy Viswanathan, vice president of Cloud Solution Strategy at CyberArk Oct 19, 2023 10 minsSecuritybrandpostSponsored by FortinetPhishing emails are more believable than ever. Here’s what to do about it.Because most ransomware is delivered through phishing, employee education is essential to protecting your organization from these threats.By Derek Manky and Rob Rashotte Oct 18, 2023 5 minsSecurityfeatureBeware the cost traps that can strain precious cybersecurity budgetsSecurity investments can come with hidden costs that aren’t always obvious but eat into security leaders’ funds without them ever realizingBy Michael Hill Oct 16, 2023 11 minsCSO and CISOBudgetSecurity Practices Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Partnerships Key to OT Cybersecurity Cyber threats are becoming an urgent problem for operating technology (OT), the hardware and software that controls industrial machines and equipment. The post Partnerships Key to OT Cybersecurity appeared first on Whitepaper Repository. By Intel Corporation 04 Dec 2023Application Performance ManagementCybercrimeSecurity whitepaper Unified Security from Code to Cloud for Financial Services By AWS and Aqua 28 Nov 2023Application Performance ManagementApplication SecuritySecurity whitepaper The 2023 Guide to DevOps and Security Tool Consolidation By JFrog 28 Nov 2023Business OperationsDevSecOpsSecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte Dec 05, 202312 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats news Hackers book profit by scamming Booking.com customers By Gagandeep Kaur Dec 04, 20234 mins Cyberattacks feature 4 budget-savvy strategies for building an effective purple team By Maril Vernon Dec 04, 202314 mins Threat and Vulnerability ManagementIT Training Risk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO