featureTop cybersecurity M&A deals for 2023Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in 2023.By CSO Staff22 Sep 202324 minsMergers and AcquisitionsData and Information SecurityIT Leadership feature The biggest data breach fines, penalties, and settlements so farBy Michael Hill18 Sep 202314 minsData BreachSecuritybrandpostSponsored by Cisco Partnering up on XDR: A rising tide lifts all security teamsBy Pete Bartolik13 Sep 20234 minsSecurity featureSecurity and privacy laws, regulations, and compliance: The complete guideBy CSO Staff 12 Sep 202349 minsRegulationComplianceSecurity opinionWhy executives should never be exempted from cybersecurity policy By Christopher Burgess 11 Sep 20236 minsCEOCFOCSO and CISO featureThe CSO guide to top security conferencesBy CSO Staff 08 Sep 202318 minsTechnology IndustryIT SkillsEvents featureEmerging cyber threats in 2023 from AI to quantum to data poisoningBy Mary K. Pratt 07 Sep 202310 minsAdvanced Persistent ThreatsHackingThreat and Vulnerability Management featureHow attackers exploit QR codes and how to mitigate the riskBy Bob Violino 05 Sep 20238 minsMobile SecurityVulnerabilitiesSecurity featureCybersecurity startups to watch for in 2023By CSO Staff 01 Sep 202319 minsCSO and CISOSecurity Articlesfeature15 top open-source intelligence toolsFind sensitive public info before the bad guys do.By Josh Fruhlinger, Ax Sharma and John Breeden 15 Aug 2023 21 minsVulnerabilitiesVulnerabilitiesVulnerabilitiesbrandpostSponsored by FortinetEmbrace services to improve security operationsBy John Maddison 10 Aug 2023 6 minsSecuritybrandpostSponsored by Palo Alto Networks3 things every SOC analyst wishes for—and how to make them come trueAs organizations grapple with new cybersecurity challenges, the need for an efficient, effective, modern-day SOC is imperative.By Austin Robertson, Global Practice Leader, Security Operations at Palo Alto Networks 08 Aug 2023 5 minsSecuritybrandpostSponsored by Cisco2023 Ransomware Trends & StrategiesWhile ransomware may recede from the headlines, the threat never goes away.By Pete Bartolik 01 Aug 2023 4 minsSecuritybrandpostSponsored by CiscoBlack Hat 2023 Preview: What not to missFrom kinetic warfare to AI threats and defenses., here is what Cisco recommends not to miss at Black Hat 2023.By Pete Bartolik 01 Aug 2023 4 minsSecurityfeatureWhat is the cost of a data breach?The cost of a data breach is not easy to define, but as more and more organizations fall victim to attacks and exposures, the financial repercussions are becoming clearer. By Michael Hill 31 Jul 2023 13 minsData BreachData BreachCyberattacksnewsFree bug hunting program for NGOs, nonprofits to expand across EuropeThe Hack4Values bug hunting program will onboard European NGOs and nonprofits to help them keep their data secure from cyber threats.By Michael Hill 27 Jul 2023 3 minsNonprofitsThreat and Vulnerability ManagementSecurityopinionThe old “trust but verify” adage should be the motto for every CISOZero trust is not enough. CISOs should abandon trust and focus on verifying everything from third-party tools to their teams' abilities.By Christopher Burgess 24 Jul 2023 7 minsCSO and CISOZero TrustIT Training brandpostSponsored by NTTWhy automation capabilities are a critical part of a security leader’s success.Automation in cybersecurity brings a multitude of benefits that empower security leaders to tackle modern challenges head-on.By Brenden Bosch, Principal Specialist, Sales Enablement at NTT 20 Jul 2023 4 minsCloud SecuritySecuritynewsInfamous hacker Kevin Mitnick dead at 59One of the world’s first and most notorious hackers, Mitnick made the FBI’s most wanted list and spent five years in prison before going straight and becoming a world-renowned “ethical hacker.”By Andrew Flynn 20 Jul 2023 3 minsHackingSecurityfeatureHow municipalities are dealing with being low-hanging targets for hackersWith lower budgets and staffing challenges, cities and municipalities must weather a host of difficulties not faced by their corporate brethren. But there are resources out there for local governments. By Deb Radcliff 20 Jul 2023 9 minsGovernment ITData and Information SecuritySecurity PracticesnewsInitial access broker posts targeting banks increase on dark webFinancial institutions should continuously monitor the dark web to identify threats and prevent breaches, Searchlight Cyber advises in a new study.By Apurva Venkat 19 Jul 2023 4 minsFinancial Services IndustryCybercrimeNetwork Security Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma 25 Sep 20234 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance 25 Sep 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security brandpost Unmasking ransomware threat clusters: Why it matters to defenders 21 Sep 20233 mins Cybercrime podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical 20 Sep 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers 07 Sep 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role 06 Sep 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical 20 Sep 202312 mins CSO and CISO video What is zero trust security? 06 Sep 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role 06 Sep 202310 mins CSO and CISO