featureTop cybersecurity M&A deals for 2023By CSO Staff30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership feature How the new deepfake reality will impact cyber insuranceBy Deb Radcliff29 Jun 20238 minsInsurance IndustryCybercrimeData and Information Securityopinion The CISO’s toolkit must include political capital within the C-suiteBy Christopher Burgess26 Jun 20235 minsCSO and CISOC-SuiteIT Leadership featureCyber liability insurance vs. data breach insurance: What's the difference?By Linda Rosencrance 14 Jun 20239 minsInsurance IndustryCyberattacksBusiness IT Alignment newsGoogle launches Secure AI Framework to help secure AI technologyBy Michael Hill 09 Jun 20234 minsIT Governance FrameworksGenerative AIArtificial Intelligence featureFormer Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breachBy Deb Radcliff 24 May 202312 minsCSO and CISOData BreachLegal feature7 cybersecurity mindsets that undermine practitioners and how to avoid themBy Matthew Tyson 17 Apr 20238 minsData and Information SecurityIT StrategyRoles brandpostSponsored by CiscoStop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the CloudBy Cisco 21 Mar 20236 minsCloud SecurityData and Information SecurityIT Leadership brandpostSponsored by Palo Alto NetworksCybersecurity Automation: Leveling the Playing Field 10 Mar 20236 minsMachine LearningArtificial IntelligenceIT Leadership ArticlesbrandpostSponsored by FortinetFortinet 2023 Skills Gap Report: How organizations can fill the talent shortage 23 Mar 2023 5 minsIT LeadershipbrandpostSponsored by CyberArkWhy intelligent privilege controls are essential for identity securityIdentity Security based on intelligent privilege controls provides organizations with the added advantage of long-term durability, adaptability, and recoverability in the face of potential attacks.By Amita Potnis 22 Mar 2023 5 minsIT LeadershipSecuritybrandpostSponsored by FortinetHere's how we can collectively shrink the cybersecurity skills gap 10 Mar 2023 5 minsIT LeadershipbrandpostSponsored by FortinetIt's Time to Create More Opportunities for Women in Cybersecurity 03 Mar 2023 4 minsIT LeadershipbrandpostSponsored by Palo Alto NetworksConnectivity and Cloud: A Chance for Zero Trust 24 Feb 2023 7 minsZero TrustIT LeadershipbrandpostSponsored by Palo Alto NetworksWhat Executives Should Know About Shift-Left SecurityNext in our Beyond the Cyber Buzzwords series, this article focuses on shift-left security. Protect your next great idea by establishing a strong security posture—from code to cloud. 24 Feb 2023 4 minsData and Information SecurityIT LeadershipbrandpostSponsored by Palo Alto NetworksAligning security and business strategiesAs cyber threats intensify, security and finance professionals need to align on strategies now more than ever. 16 Feb 2023 4 minsData and Information SecurityIT LeadershipbrandpostSponsored by Palo Alto NetworksThe Future of Machine Learning in CybersecurityWhy has machine learning become so vital in cybersecurity? This article answers that and explores several challenges that are inherent when applying machine learning. 15 Feb 2023 8 minsIT LeadershipSecuritybrandpostSponsored by FortinetEmbrace This Opportunity to Attract New Cybersecurity Talent 09 Feb 2023 5 minsIT LeadershipbrandpostSponsored by Palo Alto NetworksWhat's Next in Securing HealthcareHealthcare’s digital transformation has created so many new opportunities — not only for patients and care providers but also for bad actors. This article discusses the challenges and opportunities of security in healthcare. 30 Jan 2023 5 minsData and Information SecurityIT LeadershipbrandpostSponsored by Palo Alto NetworksIoT Adoption in Healthcare Brings Security OpportunitiesMedical IoT devices help to improve human healthcare every day. Just like humans need to do the right things to stay healthy, it’s essential for medical IoT devices to remain healthy too. Learn more about how to secure medical IoT devices. 20 Jan 2023 7 minsIoT SecurityData and Information SecurityIT LeadershipbrandpostSponsored by Palo Alto NetworksSecuring Critical Infrastructure with Zero TrustBy definition, critical infrastructure is vital. It needs to be operationally resilient, be able to reduce the potential attack surface, and minimize the new or expanding risks. Explore insights on how to secure critical infrastructure. 19 Jan 2023 7 minsData and Information SecurityIT Leadership Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Video on demand videoCreating a multicloud security architecture: IDG's CIO Think TankIDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud - including security issues IT leaders face in building a true multicloud architecture. Join us as we shed light on problems voiced by these IT executives, explore how savvy IT shops are crafting a cross-cloud security architecture, and discuss how their strategic vendor partners can help ease the burden of multicloud security for their customers. 23 Apr 2021 25 minsCIOMulti CloudIT Leadership Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsRisk ManagementIT LeadershipSecurity CIO Leadership Live with Upinder Phanda, CIO of Unisys 01 Jul 2019 52 minsCareersIT Leadership What makes a company a 'Best Place' for IT workers? 17 Jun 2019 18 minsCareersIT Leadership See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime