newsTop cybersecurity product news of the weekNew product and service announcements from Wiz, Palo Alto Networks, Sophos, SecureAuth, Kasada, Lacework, Cycode, and more.By CSO staffNov 30, 202317 minsGenerative AIGenerative AIMachine Learning news Almost all developers are using AI despite security concerns, survey suggestsBy John Mello Jr.Nov 29, 20234 minsDevelopment ToolsSecurity PracticesSupply Chainfeature 3 ways to fix old, unsafe code that lingers from open-source and legacy programsBy Maria KorolovNov 29, 20239 minsSecurity PracticesVulnerabilitiesSecurity featureCybersecurity startups to watch in 2023By CSO Staff Nov 24, 202323 minsCSO and CISOCSO and CISOC-Suite brandpostSponsored by CyberArkCloud identity security success: 3 critical factorsBy Yonatan Klein, director of product management, Cloud Security, at CyberArk Nov 20, 20235 minsSecurity brandpostSponsored by CyberArkIdentity security’s crucial role in safeguarding data privacyBy Lilach Faerman Koren, product marketing manager at CyberArk. Nov 20, 20238 minsSecurity opinionWhy the DOD's Replicator should be a model for cybersecurityBy Christopher Whyte Nov 20, 202312 minsCSO and CISOSecurity featureTop cybersecurity M&A deals for 2023By CSO Staff Nov 17, 202329 minsMergers and AcquisitionsData and Information SecurityIT Leadership brandpostSponsored by FortinetVeterans play a crucial role in filling the cybersecurity skills gapBy Rob Rashotte Nov 15, 20236 minsSecurity ArticlesbrandpostSponsored by TXOne NetworksThe rise of the cybersecurity insurance marketMitigating ransomware threats and shaping the future of cybersecurity insurance in OT environments.By TXOne Oct 24, 2023 5 minsSecuritybrandpostSponsored by DevoHow a cloud-native SIEM provides an AI-powered alternative to legacy systemsPicture this: a world where AI-enabled threat actors are launching relentless and sophisticated attacks against enterprises and critical infrastructure. By Devo Oct 24, 2023 4 minsSecuritynewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold Oct 23, 2023 3 minsDDoSHacker GroupsSecuritybrandpostSponsored by Microsoft SecurityThis Cybersecurity Awareness Month, the focus is on educationRead on to learn more about how you can better educate your organization on the fundamental elements of cybersecurity and take the next step for cyber resilience.By Microsoft Security Oct 23, 2023 5 minsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore Oct 23, 2023 6 minsSecuritybrandpostSponsored by CyberArkEngaging insiders to combat insider threatsThere’s no silver bullet for insider threat protection; however, a greater focus on culture, engagement and empowerment can make a real difference.By Omer Grossman, global chief information officer at CyberArk Oct 19, 2023 6 minsSecuritybrandpostSponsored by CyberArkThe MGM Resorts attack: initial analysisThe recent cyberattack on MGM Resorts provides a useful case study on security best practices in today’s digital landscape.By Andy Thompson, Offensive Research Evangelist at CyberArk Labs Oct 19, 2023 9 minsSecuritybrandpostSponsored by CyberArk6 essential steps for identity security in multi-cloud environmentsCyberArk’s Insight to Action framework helps address this gap between detection and remediation and offers a deep dive into six pivotal areas recognized as substantial threats in the cloud environment.By Paddy Viswanathan, vice president of Cloud Solution Strategy at CyberArk Oct 19, 2023 10 minsSecuritybrandpostSponsored by FortinetPhishing emails are more believable than ever. Here’s what to do about it.Because most ransomware is delivered through phishing, employee education is essential to protecting your organization from these threats.By Derek Manky and Rob Rashotte Oct 18, 2023 5 minsSecurityfeatureBeware the cost traps that can strain precious cybersecurity budgetsSecurity investments can come with hidden costs that aren’t always obvious but eat into security leaders’ funds without them ever realizingBy Michael Hill Oct 16, 2023 11 minsCSO and CISOBudgetSecurity PracticesbrandpostSponsored by Microsoft SecurityImprove your cyber threat understanding with geopolitical contextThis strategic analysis of international cyber threat activity is critical for protecting vulnerable audiences who may become the target of future attacks.By Microsoft Security Oct 15, 2023 5 minsSecuritynewsGenerative AI is scaring CISOs – but adoption isn’t slowing downIncluding security concerns at the beginning of any generative AI adoption discussion is key, but meanwhile the good news is cybersecurity budgets for AI are rising.By Jon Gold Oct 12, 2023 3 minsBudgetBudgetBudget Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Watch the "Cyber Risk is a Business Risk Keynote" Video Dive into the dynamic intersection of cybersecurity and business risk in this insightful keynote replay. The post Watch the “Cyber Risk is a Business Risk Keynote” Video appeared first on Whitepaper Repository. By Trend Micro 28 Nov 2023CybercrimeData and Information SecuritySecurity whitepaper Stay Secure: Get the top ransomware insights now By Trend Micro 28 Nov 2023Business OperationsCyberattacksSecurity whitepaper Read Omdia's Public Vulnerability Report Available Now By Trend Micro 28 Nov 2023Business OperationsData and Information SecuritySecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless Nov 30, 20238 mins Security Operations CenterData and Information SecuritySecurity Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement By Lucian Constantin Nov 30, 20238 mins Multi-factor AuthenticationSingle Sign-onRemote Access Security news Amazon debuts biometric security device, updates Detective and GuardDuty By Jon Gold Nov 29, 20233 mins BiometricsSecurity Monitoring SoftwareThreat and Vulnerability Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO