feature10 things you should know about navigating the dark webA lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely.By Rosalyn PageOct 02, 202313 minsCybercrimeSecurity feature Cybersecurity startups to watch for in 2023By CSO StaffSep 29, 202319 minsCSO and CISOSecurityfeature What’s a cyber incident response retainer and why do you need one?By Linda RosencranceSep 27, 20238 minsCyberattacksIncident ResponseSecurity Practices brandpostSponsored by FortinetHow an integrated platform approach improves OT securityBy Richard Springer Sep 26, 20235 minsSecurity news analysisDHS unveils one common platform for reporting cyber incidentsBy Cynthia Brumfield Sep 25, 202310 minsRegulationGovernmentIncident Response featureTop cybersecurity M&A deals for 2023By CSO Staff Sep 22, 202324 minsMergers and AcquisitionsData and Information SecurityIT Leadership brandpostSponsored by TXOne NetworksProactive OT security requires visibility + preventionBy Austen Byers, Technical Director at TXOne Networks Sep 21, 20234 minsSecurity featureThe biggest data breach fines, penalties, and settlements so farBy Michael Hill Sep 18, 202314 minsData BreachData BreachCyberattacks newsNew CISO appointments 2023By CSO Staff Sep 15, 202322 minsCSO and CISOCareersSecurity ArticlesfeatureHow attackers exploit QR codes and how to mitigate the riskAttackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.By Bob Violino Sep 05, 2023 8 minsMobile SecurityMobile SecurityMobile SecuritybrandpostSponsored by TXOne NetworksSecuring the future: Safeguarding cyber-physical systems As digital and physical realms converge, a hybrid technology has emerged: cyber-physical systems (CPS). These systems integrate computer-based algorithms with physical processes so that virtual instructions can be executed in the real world, turning digital concepts into concrete realities. By Dan Cartmill Aug 31, 2023 5 minsSecuritybrandpostSponsored by FortinetEvaluating SOC-as-a-Service providers? Assess these 5 attributes. By David Finger Aug 30, 2023 5 minsSecuritybrandpostSponsored by SophosStressed Out and Overwhelmed, SecOps Teams Struggle to Keep UpBad actors are always finding new techniques. And security tools are always finding new alerts. How can SecOps stay out in front with so much noise? Aug 28, 2023 3 minsSecuritybrandpostSponsored by Microsoft SecurityCyberthreats are taking center fieldSports organizers, regional host facilities, and even event attendees face a heightened degree of cyber risk due to increasingly connected environments. Securing these environments is a top priority today.By Microsoft Security Aug 28, 2023 SecurityopinionHacking the future: Notes from DEF CON's Generative Red Team ChallengeA challenge at the DEF CON hacker convention in Las Vegas was billed as the first instance of a live event tackling a generative AI system. By Christopher Burgess Aug 28, 2023 5 minsHackingGenerative AISecuritybrandpostSponsored by CiscoInsights from a CISO Survival GuideCisco's CISO Survival Guide set out to uncover how modern enterprises should be secured given the uniquely evolving challenges of Identity management, data protection, software supply chain integrity, and ongoing cloud migration—all in the face of Generative AI-induced disruption.By Pete Bartolik Aug 24, 2023 4 minsSecuritybrandpostSponsored by FortinetWebshells: Why an old tactic is still relevantBy Aamir Lakhani, Global Security Strategist and Researcher, Fortinet Aug 24, 2023 6 minsSecuritybrandpostSponsored by CiscoNavigating the AI frontier: cybercrime's evolution and defense strategiesThis article focuses on the dual effects of AI on cybercrime and its implications for defense.By Dr. Giannis Tziakouris, Senior Incident Responder at Cisco Talos Intelligence Group Aug 23, 2023 4 minsSecuritybrandpostSponsored by CiscoAdapting tools & tactics to fight modern ransomwareMany backup solutions rely on snapshots taken every 24 hours, but that leaves a substantial amount of data at risk in the event of an attack. That's where extended detection and response (XDR) comes in.By Pete Bartolik Aug 22, 2023 4 minsSecurityopinionAre you prepared for the rise of the artificial intelligence CISO?It’s inevitable that AI systems will be tasked with more and more cybersecurity responsibilities. It is time to start thinking about how the roles of human CISOs and AI will evolve.By Christopher Whyte Aug 21, 2023 13 minsCSO and CISOGenerative AISecurity PracticesfeatureTasks that bog down security teams (and what to do about them)Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems. By Mary K. Pratt Aug 21, 2023 13 minsCSO and CISOHuman ResourcesBusiness IT Alignment Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Pythian's Enterprise Guide to Google Workspace Security While Google Workspace offers native security controls, this suite of collaboration and productivity tools also runs on a shared responsibility model. The post Pythian's Enterprise Guide to Google Workspace Security appeared first on Whitepaper Repository. By Pythian 29 Sep 2023Business OperationsData and Information SecuritySecurity whitepaper How Hyperautomation Is Used to Reduce Gaps and Inefficiencies in Network Cybersecurity By Torq 28 Sep 2023CyberattacksNetwork SecuritySecurity whitepaper The CIOs Roadmap to Risk Migration By Sophos 28 Sep 2023Application Performance ManagementCyberattacksSecurity View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance By Samira Sarraf Oct 02, 20236 mins CSO and CISOCSO and CISOCSO and CISO news Royal family’s website suffers Russia-linked cyberattack By Michael Hill Oct 02, 20232 mins DDoSCyberattacks news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year By Lucian Constantin Oct 02, 20234 mins Hacker GroupsRansomwareCybercrime podcast CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks Oct 02, 202314 mins CSO and CISO podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO video CSO Executive Sessions Australia with Nathan Morelli, Head of Cyber Security and IT Resilience at SA Power Networks Oct 02, 202314 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security