brandpostSponsored by CorelliumShifting security left: DevSecOps meets virtualizationBy Anthony Ricco, CMO of Corellium. 01 Jul 20234 minsSecurity news analysis Attackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin30 Jun 20234 minsCybercrimenews Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsPerception Point unveils new detection model to tackle generative AI BEC attacksBy Michael Hill 29 Jun 20233 minsIntrusion Detection SoftwareIntrusion Detection SoftwareIntrusion Detection Software newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks ArticlesbrandpostSponsored by FortinetEffective security training programs are vital to creating a cyber-aware workforceCreating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks.By Rob Rashotte 26 Jun 2023 5 minsSecuritybrandpostSponsored by SynopsysCybersecurity recommendations—strengthening the government posture and engagementNearly 60% of 335 cybersecurity recommendations the General Accounting Office has made for federal agencies since 2010 have not been implemented. Effective oversight must be implemented.By Taylor Armerding, Security Advocate at Synopsys Software Integrity Group 26 Jun 2023 7 minsSecuritybrandpostSponsored by SynopsysWhat is the key to optimized DevSecOps? Key insights from AppSec Decoded to improve the ‘Sec’ in DevSecOps—what to know today.By Synopsys 26 Jun 2023 2 minsSecurityopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess 26 Jun 2023 5 minsCSO and CISOC-SuiteIT LeadershipbrandpostSponsored by CiscoCisco Secure Access: secure connectivity from anything to anywhere from everywhereCisco Secure Access manages policies that govern network connections, making life better and easier for users and IT alike.By Jeff Schaeffer, VP of Security Service Edge (SSE), Cisco 23 Jun 2023 3 minsSecuritybrandpostSponsored by ZscalerStudy finds Zscaler can save $2.1 million annuallyA new study led by IDC highlights the impact a cloud-delivered approach to data protection can have on the bottom line. The results were eye-opening.By Zscaler 23 Jun 2023 6 minsSecuritynewsNew CISO appointments 2023Keep up with news of CSO, CISO, and other senior security executive appointments.By CSO Staff 23 Jun 2023 14 minsCSO and CISOCareersSecuritybrandpostSponsored by FortinetReducing cyber risks by upskilling your security talentThe threat landscape is moving at such an unprecedented pace that even the most well-staffed enterprises are finding it difficult to effectively protect their digital assets.By Rob Rashotte 22 Jun 2023 5 minsSecuritybrandpostSponsored by TXOneReducing waste in value generation centers with OT securityOperational waste from preventable defects costs your business real money. TXOne Stellar can help. 21 Jun 2023 5 minsSecuritybrandpostSponsored by Microsoft Security5 key steps to push back against business email compromiseFighting business email compromise requires vigilance and awareness, it’s time to join the discussion. By Microsoft Security 21 Jun 2023 5 minsSecuritybrandpostSponsored by Microsoft SecurityMicrosoft special report: Iran's adoption of cyber-enabled influence operationsIranian groups have turned to cyber-enabled influence operations to fuel the regime’s objectives for geopolitical change. Read more about these techniques and what they could mean for future threats. 14 Jun 2023 4 minsSecurityfeatureTo solve the cybersecurity worker gap, forget the job title and search for the skills you needCISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.By Mary K. Pratt 12 Jun 2023 11 minsHiringIT SkillsIT Training Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity whitepaper 7 Common Ways Ransomware Can Infect Your Organisation By Sentinel One 31 Oct 2022CybercrimeRansomwareSecurity View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime