featureCybersecurity startups to watch for in 2023These startups are jumping in where most established security vendors have yet to go.By CSO StaffSep 29, 202319 minsCSO and CISOSecurity feature What’s a cyber incident response retainer and why do you need one?By Linda RosencranceSep 27, 20238 minsCyberattacksIncident ResponseSecurity PracticesbrandpostSponsored by Fortinet How an integrated platform approach improves OT securityBy Richard SpringerSep 26, 20235 minsSecurity news analysisDHS unveils one common platform for reporting cyber incidentsBy Cynthia Brumfield Sep 25, 202310 minsRegulationGovernmentIncident Response featureTop cybersecurity M&A deals for 2023By CSO Staff Sep 22, 202324 minsMergers and AcquisitionsData and Information SecurityIT Leadership brandpostSponsored by TXOne NetworksProactive OT security requires visibility + preventionBy Austen Byers, Technical Director at TXOne Networks Sep 21, 20234 minsSecurity featureThe biggest data breach fines, penalties, and settlements so farBy Michael Hill Sep 18, 202314 minsData BreachData BreachCyberattacks newsNew CISO appointments 2023By CSO Staff Sep 15, 202322 minsCSO and CISOCareersSecurity brandpostSponsored by Microsoft Security5 cyber hygiene strategies to help prevent cyber attacks By Microsoft Security Sep 14, 20236 minsSecurity ArticlesbrandpostSponsored by TXOne NetworksSecuring the future: Safeguarding cyber-physical systems As digital and physical realms converge, a hybrid technology has emerged: cyber-physical systems (CPS). These systems integrate computer-based algorithms with physical processes so that virtual instructions can be executed in the real world, turning digital concepts into concrete realities. By Dan Cartmill Aug 31, 2023 5 minsSecuritybrandpostSponsored by FortinetEvaluating SOC-as-a-Service providers? Assess these 5 attributes. By David Finger Aug 30, 2023 5 minsSecuritybrandpostSponsored by SophosStressed Out and Overwhelmed, SecOps Teams Struggle to Keep UpBad actors are always finding new techniques. And security tools are always finding new alerts. How can SecOps stay out in front with so much noise? Aug 28, 2023 3 minsSecuritybrandpostSponsored by Microsoft SecurityCyberthreats are taking center fieldSports organizers, regional host facilities, and even event attendees face a heightened degree of cyber risk due to increasingly connected environments. Securing these environments is a top priority today.By Microsoft Security Aug 28, 2023 SecurityopinionHacking the future: Notes from DEF CON's Generative Red Team ChallengeA challenge at the DEF CON hacker convention in Las Vegas was billed as the first instance of a live event tackling a generative AI system. By Christopher Burgess Aug 28, 2023 5 minsHackingGenerative AISecuritybrandpostSponsored by CiscoInsights from a CISO Survival GuideCisco's CISO Survival Guide set out to uncover how modern enterprises should be secured given the uniquely evolving challenges of Identity management, data protection, software supply chain integrity, and ongoing cloud migration—all in the face of Generative AI-induced disruption.By Pete Bartolik Aug 24, 2023 4 minsSecuritybrandpostSponsored by FortinetWebshells: Why an old tactic is still relevantBy Aamir Lakhani, Global Security Strategist and Researcher, Fortinet Aug 24, 2023 6 minsSecuritybrandpostSponsored by CiscoNavigating the AI frontier: cybercrime's evolution and defense strategiesThis article focuses on the dual effects of AI on cybercrime and its implications for defense.By Dr. Giannis Tziakouris, Senior Incident Responder at Cisco Talos Intelligence Group Aug 23, 2023 4 minsSecuritybrandpostSponsored by CiscoAdapting tools & tactics to fight modern ransomwareMany backup solutions rely on snapshots taken every 24 hours, but that leaves a substantial amount of data at risk in the event of an attack. That's where extended detection and response (XDR) comes in.By Pete Bartolik Aug 22, 2023 4 minsSecurityopinionAre you prepared for the rise of the artificial intelligence CISO?It’s inevitable that AI systems will be tasked with more and more cybersecurity responsibilities. It is time to start thinking about how the roles of human CISOs and AI will evolve.By Christopher Whyte Aug 21, 2023 13 minsCSO and CISOGenerative AISecurity PracticesfeatureTasks that bog down security teams (and what to do about them)Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems. By Mary K. Pratt Aug 21, 2023 13 minsCSO and CISOHuman ResourcesBusiness IT AlignmentbrandpostSponsored by SophosPrevention First: Don’t Neglect Endpoint SecurityAmong talk of newer and buzzier technologies like MDR and XDR, security experts say it is still essential to lock down the endpoint first. Aug 18, 2023 3 minsSecurity Show more Show less View all Upcoming Events02/Oct-04/Oct awards CSO50 Conference + AwardsOct 02, 2023Phoenix, AZ CSO and CISOCybercrimeSecurity 07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper How Hyperautomation Is Used to Reduce Gaps and Inefficiencies in Network Cybersecurity Torq's enterprise-grade security hyperautomation platform unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity. The post How Hyperautomation Is Used to Reduce Gaps and Inefficiencies in Network Cybersecurity appeared first on Whitepaper Repository. By Torq 28 Sep 2023CyberattacksNetwork SecuritySecurity whitepaper The CIOs Roadmap to Risk Migration By Sophos 28 Sep 2023Application Performance ManagementCyberattacksSecurity whitepaper Critical Factors for Implementing CSaaS By Sophos 28 Sep 2023Application Performance ManagementCybercrimeSecurity View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity By Michael Hill Sep 29, 20234 mins Education IndustryEducation IndustryEducation Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches By Michael Hill Sep 29, 20233 mins GovernmentCybercrimeData and Information Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules By Cynthia Brumfield Sep 28, 20236 mins RegulationData BreachFinancial Services Industry podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO