newsNew CISO appointments 2023Keep up with news of CSO, CISO, and other senior security executive appointments.By CSO StaffDec 08, 202328 minsCSO and CISOCareersSecurity news Top cybersecurity product news of the weekBy CSO staffDec 07, 202322 minsGenerative AISecuritybrandpostSponsored by Microsoft Security How Microsoft and Amazon are expanding the fight against international tech support fraudBy Microsoft SecurityDec 05, 20235 minsSecurity brandpostSponsored by Palo Alto NetworksAddressing vulnerabilities in OT environments requires a Zero Trust approachBy Navneet Singh, vice president of marketing, network security, Palo Alto Networks Dec 05, 20236 minsSecurity news analysisDeepfakes emerge as a top security threat ahead of the 2024 US electionBy Cynthia Brumfield Dec 05, 20237 minsElection HackingGovernmentSecurity Practices news analysisP2Pinfect Redis worm targets IoT with version for MIPS devicesBy Lucian Constantin Dec 04, 20235 minsBotnetsHacker GroupsSecurity Practices opinionProactive, not reactive: the path to ensuring operational resilience in cybersecurityBy Cameron Dicker Dec 04, 20236 minsFinancial Services IndustryData and Information SecuritySecurity Practices featureThe CSO guide to top security conferencesBy CSO Staff Dec 01, 20236 minsTechnology IndustryIT SkillsEvents newsAlmost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr. Nov 29, 20234 minsDevelopment ToolsSecurity PracticesSupply Chain ArticlesnewsSearchlight Cyber partners with the Innocent Lives Foundation to catch child predatorsThe ILF is using intelligence firm Searchlight’s dark web investigation solution Cerberus to gather intelligence and build cases against offenders operating on the dark web.By Michael Hill Nov 01, 2023 3 minsSecurityopinionWhat the White House executive order on AI means for cybersecurity leadersWhile global government initiatives on AI are pointed in the right direction, it’s clear that CISOs will be on the front lines when it comes to facing its threats. By Christopher Burgess Oct 31, 2023 6 minsCSO and CISOGovernmentThreat and Vulnerability ManagementnewsUK Prime Minister announces world’s first AI Safety InstituteAI Safety Institute will examine, evaluate, and test new types of artificial intelligenceBy Michael Hill Oct 26, 2023 4 minsGenerative AISecuritybrandpostSponsored by Palo Alto NetworksCSO- AI’s Impact on Cybersecurity It’s on everyone’s mind: How will AI benefit threat actors?By Michael "Siko" Sikorski with David Moulton Oct 25, 2023 3 minsCyberattacksSecuritybrandpostSponsored by Palo Alto NetworksStreamlining security platforms for faster implementation and enhanced risk resolution CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue.By Haider Pasha, Senior Director and Chief Security Officer Oct 24, 2023 5 minsSecuritybrandpostSponsored by TXOne NetworksThe rise of the cybersecurity insurance marketMitigating ransomware threats and shaping the future of cybersecurity insurance in OT environments.By TXOne Oct 24, 2023 5 minsSecuritybrandpostSponsored by DevoHow a cloud-native SIEM provides an AI-powered alternative to legacy systemsPicture this: a world where AI-enabled threat actors are launching relentless and sophisticated attacks against enterprises and critical infrastructure. By Devo Oct 24, 2023 4 minsSecuritynewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold Oct 23, 2023 3 minsDDoSHacker GroupsSecuritybrandpostSponsored by Microsoft SecurityThis Cybersecurity Awareness Month, the focus is on educationRead on to learn more about how you can better educate your organization on the fundamental elements of cybersecurity and take the next step for cyber resilience.By Microsoft Security Oct 23, 2023 5 minsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore Oct 23, 2023 6 minsSecuritybrandpostSponsored by CyberArkEngaging insiders to combat insider threatsThere’s no silver bullet for insider threat protection; however, a greater focus on culture, engagement and empowerment can make a real difference.By Omer Grossman, global chief information officer at CyberArk Oct 19, 2023 6 minsSecuritybrandpostSponsored by CyberArkThe MGM Resorts attack: initial analysisThe recent cyberattack on MGM Resorts provides a useful case study on security best practices in today’s digital landscape.By Andy Thompson, Offensive Research Evangelist at CyberArk Labs Oct 19, 2023 9 minsSecurity Show more Show less View all Resources whitepaper 2022 Payment Security Report This report is a welcome wake-up call to organizations that strong leadership is required to address failures to adequately manage payment security. The post 2022 Payment Security Report appeared first on Whitepaper Repository. By Verizon 06 Dec 2023Business OperationsComplianceSecurity whitepaper Partnerships Key to OT Cybersecurity By Intel Corporation 04 Dec 2023Application Performance ManagementCybercrimeSecurity whitepaper Unified Security from Code to Cloud for Financial Services By AWS and Aqua 28 Nov 2023Application Performance ManagementApplication SecuritySecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature Accenture takes an industrialized approach to safeguarding its cloud controls By Aimee Chanthadavong Dec 11, 20238 mins ComplianceComplianceCompliance news analysis LogoFAIL attack can inject malware in the firmware of many computers By Lucian Constantin Dec 08, 20238 mins MalwareVulnerabilities news Google expands minimum security guidelines for third-party vendors By John P. Mello Jr. Dec 08, 20234 mins Application SecuritySupply Chain podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO