brandpostSponsored by CorelliumShifting security left: DevSecOps meets virtualizationBy Anthony Ricco, CMO of Corellium. 01 Jul 20234 minsSecurity news analysis Attackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin30 Jun 20234 minsCybercrimenews Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsPerception Point unveils new detection model to tackle generative AI BEC attacksBy Michael Hill 29 Jun 20233 minsIntrusion Detection SoftwareIntrusion Detection SoftwareIntrusion Detection Software newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks ArticlesbrandpostSponsored by FortinetEffective security training programs are vital to creating a cyber-aware workforceCreating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks.By Rob Rashotte 26 Jun 2023 5 minsSecurityopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess 26 Jun 2023 5 minsCSO and CISOC-SuiteIT LeadershipbrandpostSponsored by CiscoCisco Secure Access: secure connectivity from anything to anywhere from everywhereCisco Secure Access manages policies that govern network connections, making life better and easier for users and IT alike.By Jeff Schaeffer, VP of Security Service Edge (SSE), Cisco 23 Jun 2023 3 minsSecuritybrandpostSponsored by FortinetReducing cyber risks by upskilling your security talentThe threat landscape is moving at such an unprecedented pace that even the most well-staffed enterprises are finding it difficult to effectively protect their digital assets.By Rob Rashotte 22 Jun 2023 5 minsSecurityfeatureTo solve the cybersecurity worker gap, forget the job title and search for the skills you needCISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.By Mary K. Pratt 12 Jun 2023 11 minsHiringIT SkillsIT Training featureCybersecurity startups to watch for in 2023These startups are jumping in where most established security vendors have yet to go.By CSO Staff 09 Jun 2023 11 minsCSO and CISOSecurityopinionDepartment of Defense AI principles have a place in the CISO's playbookBy Christopher Burgess 06 Jun 2023 5 minsCSO and CISOAerospace and Defense IndustryArtificial Intelligencefeature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill 05 Jun 2023 9 minsGovernmentCritical InfrastructureData and Information SecuritynewsISACA pledges to help grow cybersecurity workforce in EuropeISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations.By Michael Hill 01 Jun 2023 3 minsHiringCareersSecurityopinionInsider risk management: Where your program resides shapes its focusChoosing which department should be responsible for protecting an organization from threats from within isn’t always straightforward. By Christopher Burgess 29 May 2023 6 minsThreat and Vulnerability ManagementSecurityfeature6 ways generative AI chatbots and LLMs can enhance cybersecurityGenerative AI chatbots and large language models can be a double-edged swords from a risk perspective, but with proper use they can also improve cybersecurity in key waysBy Michael Hill 25 May 2023 7 minsGenerative AIGenerative AIGenerative AIreviewsThe 6 best password managers for businessA password manager can help you implement strong passwords everywhere for your business. Here are the features to look for and top choices for business use.By Josh Fruhlinger and Tim Ferrill 11 May 2023 11 minsSmall and Medium BusinessSmall and Medium BusinessSmall and Medium Business Show more Show less View all Resources whitepaper The 7 Pitfalls to Avoid when Selecting an SSE Solution This white paper outlines the seven pitfalls businesses should avoid when selecting a Security Service Edge (SSE) solution. The post The 7 Pitfalls to Avoid when Selecting an SSE Solution appeared first on Whitepaper Repository. By Zscaler 03 May 2022Managed Service ProvidersNetwork SecuritySecurity View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime