brandpostSponsored by CorelliumShifting security left: DevSecOps meets virtualizationBy Anthony Ricco, CMO of Corellium. 01 Jul 20234 minsSecurity news analysis Attackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin30 Jun 20234 minsCybercrimenews Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership brandpostSponsored by InfosysThe real impact of cybersecurity breaches on customer trust 30 Jun 20239 minsCyberattacks news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsPerception Point unveils new detection model to tackle generative AI BEC attacksBy Michael Hill 29 Jun 20233 minsIntrusion Detection SoftwareIntrusion Detection SoftwareIntrusion Detection Software ArticlesbrandpostSponsored by FortinetEffective security training programs are vital to creating a cyber-aware workforceCreating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks.By Rob Rashotte 26 Jun 2023 5 minsSecurityopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess 26 Jun 2023 5 minsCSO and CISOC-SuiteIT LeadershipbrandpostSponsored by CiscoCisco Secure Access: secure connectivity from anything to anywhere from everywhereCisco Secure Access manages policies that govern network connections, making life better and easier for users and IT alike.By Jeff Schaeffer, VP of Security Service Edge (SSE), Cisco 23 Jun 2023 3 minsSecuritybrandpostSponsored by FortinetReducing cyber risks by upskilling your security talentThe threat landscape is moving at such an unprecedented pace that even the most well-staffed enterprises are finding it difficult to effectively protect their digital assets.By Rob Rashotte 22 Jun 2023 5 minsSecurityfeatureTo solve the cybersecurity worker gap, forget the job title and search for the skills you needCISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.By Mary K. Pratt 12 Jun 2023 11 minsHiringIT SkillsIT Training featureCybersecurity startups to watch for in 2023These startups are jumping in where most established security vendors have yet to go.By CSO Staff 09 Jun 2023 11 minsCSO and CISOSecuritybrandpostSponsored by Rapid7The monumental shifts in Australia & New Zealand's threat landscapeBy Rapid7 06 Jun 2023 4 minsThreat and Vulnerability ManagementSecurityopinionDepartment of Defense AI principles have a place in the CISO's playbookBy Christopher Burgess 06 Jun 2023 5 minsCSO and CISOAerospace and Defense IndustryArtificial Intelligencefeature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill 05 Jun 2023 9 minsGovernmentCritical InfrastructureData and Information SecuritynewsISACA pledges to help grow cybersecurity workforce in EuropeISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations.By Michael Hill 01 Jun 2023 3 minsHiringCareersSecuritynewsAustralian organisations seek cybersecurity engineersFilling cybersecurity roles remains a priority and the top technology role Australian organisations are looking to fill is that of a cybersecurity engineer.By Samira Sarraf 01 Jun 2023 2 minsHiringCareersSecurityopinionInsider risk management: Where your program resides shapes its focusChoosing which department should be responsible for protecting an organization from threats from within isn’t always straightforward. By Christopher Burgess 29 May 2023 6 minsThreat and Vulnerability ManagementSecurity Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity whitepaper Regional Trends Around Password Management By LastPass 05 Apr 2023Password ManagersSecuritySecurity Practices View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime