featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO StaffDec 01, 20236 minsTechnology IndustryIT SkillsEvents news Top cybersecurity product news of the weekBy CSO staffNov 30, 202317 minsGenerative AISecuritynews Almost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr.Nov 29, 20234 minsDevelopment ToolsSecurity PracticesSupply Chain feature3 ways to fix old, unsafe code that lingers from open-source and legacy programsBy Maria Korolov Nov 29, 20239 minsSecurity PracticesVulnerabilitiesSecurity featureCybersecurity startups to watch in 2023By CSO Staff Nov 24, 202323 minsCSO and CISOSecurity brandpostSponsored by CyberArkCloud identity security success: 3 critical factorsBy Yonatan Klein, director of product management, Cloud Security, at CyberArk Nov 20, 20235 minsSecurity brandpostSponsored by CyberArkIdentity security’s crucial role in safeguarding data privacyBy Lilach Faerman Koren, product marketing manager at CyberArk. Nov 20, 20238 minsSecurity opinionWhy the DOD's Replicator should be a model for cybersecurityBy Christopher Whyte Nov 20, 202312 minsCSO and CISOSecurity featureTop cybersecurity M&A deals for 2023By CSO Staff Nov 17, 202329 minsMergers and AcquisitionsData and Information SecurityIT Leadership ArticlesbrandpostSponsored by TXOne NetworksThe rise of the cybersecurity insurance marketMitigating ransomware threats and shaping the future of cybersecurity insurance in OT environments.By TXOne Oct 24, 2023 5 minsSecuritybrandpostSponsored by DevoHow a cloud-native SIEM provides an AI-powered alternative to legacy systemsPicture this: a world where AI-enabled threat actors are launching relentless and sophisticated attacks against enterprises and critical infrastructure. By Devo Oct 24, 2023 4 minsSecuritynewsHamas’ online infrastructure reveals ties to Iran APT, researchers sayAn analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government.By Jon Gold Oct 23, 2023 3 minsDDoSHacker GroupsSecuritybrandpostSponsored by Microsoft SecurityThis Cybersecurity Awareness Month, the focus is on educationRead on to learn more about how you can better educate your organization on the fundamental elements of cybersecurity and take the next step for cyber resilience.By Microsoft Security Oct 23, 2023 5 minsSecuritybrandpostSponsored by Palo Alto Networks3 ways to enable cyber resilience in education in 2023 and beyondAs I look at today’s threat environment and the steps we can take to protect our institutions and provide guidance for the next generation, I see three key areas of opportunity.By Jeffery Tay, EXCO member of SingAREN and Deputy Director of ICT Infrastructure & Cybersecurity at Nanyang Polytechnic, Singapore Oct 23, 2023 6 minsSecuritybrandpostSponsored by CyberArkEngaging insiders to combat insider threatsThere’s no silver bullet for insider threat protection; however, a greater focus on culture, engagement and empowerment can make a real difference.By Omer Grossman, global chief information officer at CyberArk Oct 19, 2023 6 minsSecuritybrandpostSponsored by CyberArkThe MGM Resorts attack: initial analysisThe recent cyberattack on MGM Resorts provides a useful case study on security best practices in today’s digital landscape.By Andy Thompson, Offensive Research Evangelist at CyberArk Labs Oct 19, 2023 9 minsSecuritybrandpostSponsored by CyberArk6 essential steps for identity security in multi-cloud environmentsCyberArk’s Insight to Action framework helps address this gap between detection and remediation and offers a deep dive into six pivotal areas recognized as substantial threats in the cloud environment.By Paddy Viswanathan, vice president of Cloud Solution Strategy at CyberArk Oct 19, 2023 10 minsSecuritybrandpostSponsored by FortinetPhishing emails are more believable than ever. Here’s what to do about it.Because most ransomware is delivered through phishing, employee education is essential to protecting your organization from these threats.By Derek Manky and Rob Rashotte Oct 18, 2023 5 minsSecurityfeatureBeware the cost traps that can strain precious cybersecurity budgetsSecurity investments can come with hidden costs that aren’t always obvious but eat into security leaders’ funds without them ever realizingBy Michael Hill Oct 16, 2023 11 minsCSO and CISOBudgetSecurity PracticesbrandpostSponsored by Microsoft SecurityImprove your cyber threat understanding with geopolitical contextThis strategic analysis of international cyber threat activity is critical for protecting vulnerable audiences who may become the target of future attacks.By Microsoft Security Oct 15, 2023 5 minsSecuritynewsGenerative AI is scaring CISOs – but adoption isn’t slowing downIncluding security concerns at the beginning of any generative AI adoption discussion is key, but meanwhile the good news is cybersecurity budgets for AI are rising.By Jon Gold Oct 12, 2023 3 minsBudgetGenerative AISecurity Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Unified Security from Code to Cloud for Financial Services Reduce risk, improve visibility, and take action with end-to-end application security powered by Aqua and AWS The post Unified Security from Code to Cloud for Financial Services appeared first on Whitepaper Repository. By AWS and Aqua 28 Nov 2023Application Performance ManagementApplication SecuritySecurity whitepaper The 2023 Guide to DevOps and Security Tool Consolidation By JFrog 28 Nov 2023Business OperationsDevSecOpsSecurity whitepaper The Strategic Imperative for Software Supply Chain Security By JFrog 28 Nov 2023Business OperationsSecuritySupply Chain Management Software View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Is China waging a cyber war with Taiwan? By Gagandeep Kaur Dec 01, 20234 mins CyberattacksGovernment news Apple patches info-stealing, zero day bugs in iPads and Macs By Shweta Sharma Dec 01, 20233 mins Zero-day vulnerability news Conti-linked ransomware takes in $107 million in ransoms: Report By Jon Gold Nov 30, 20234 mins Ransomware podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO