brandpostSponsored by CorelliumShifting security left: DevSecOps meets virtualizationBy Anthony Ricco, CMO of Corellium. 01 Jul 20234 minsSecurity news analysis Attackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin30 Jun 20234 minsCybercrimenews Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities newsFirst state-sponsored cyberattack against UK government revealed two decades laterBy Michael Hill 30 Jun 20233 minsCyberattacksGovernment news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source newsNHS data reportedly compromised in University of Manchester cyberattackBy Michael Hill 30 Jun 20234 minsData BreachCyberattacks featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance ArticlesnewsSurvey reveals mass concern over generative AI security risksMalwarebytes survey reveals 81% of people are concerned about the security risks posed by ChatGPT and generative AI, while just 7% think they will improve internet security.By Michael Hill 27 Jun 2023 3 minsGenerative AISecuritybrandpostSponsored by FortinetEffective security training programs are vital to creating a cyber-aware workforceCreating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks.By Rob Rashotte 26 Jun 2023 5 minsSecurityopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess 26 Jun 2023 5 minsCSO and CISOC-SuiteIT LeadershipbrandpostSponsored by CiscoCisco Secure Access: secure connectivity from anything to anywhere from everywhereCisco Secure Access manages policies that govern network connections, making life better and easier for users and IT alike.By Jeff Schaeffer, VP of Security Service Edge (SSE), Cisco 23 Jun 2023 3 minsSecuritybrandpostSponsored by FortinetReducing cyber risks by upskilling your security talentThe threat landscape is moving at such an unprecedented pace that even the most well-staffed enterprises are finding it difficult to effectively protect their digital assets.By Rob Rashotte 22 Jun 2023 5 minsSecurityfeatureTo solve the cybersecurity worker gap, forget the job title and search for the skills you needCISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.By Mary K. Pratt 12 Jun 2023 11 minsHiringIT SkillsIT Training featureCybersecurity startups to watch for in 2023These startups are jumping in where most established security vendors have yet to go.By CSO Staff 09 Jun 2023 11 minsCSO and CISOSecuritynewsGoogle partners with UK NCSC to offer free cybersecurity training for SMEsGoogle’s free SME cybersecurity training programme spans four modules covering employees, networks, and devices.By Michael Hill 08 Jun 2023 2 minsIT SkillsSecurityopinionDepartment of Defense AI principles have a place in the CISO's playbookBy Christopher Burgess 06 Jun 2023 5 minsCSO and CISOAerospace and Defense IndustryArtificial IntelligencenewsUK NCSC announces closure of CCP cyber certification schemeCCP applications to close from June 30 as UK cybersecurity sector prepares for introduction of new chartered titles.By Michael Hill 05 Jun 2023 2 minsCertificationsCareersSecurityfeature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill 05 Jun 2023 9 minsGovernmentCritical InfrastructureData and Information SecuritynewsISACA pledges to help grow cybersecurity workforce in EuropeISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations.By Michael Hill 01 Jun 2023 3 minsHiringCareersSecurity Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime