featureHow CISOs can balance the risks and benefits of AIRapid growth and development of AI is pushing the limits of cybersecurity and CISOs must take charge now to be ahead of a range of risks including data leak, compliance and prompt injection attacks.By Maria Korolov26 Jun 202310 minsCSO and CISORisk Management news RangeForce launches Defense Readiness Index to measure businesses’ cybersecurity capabilitiesBy Michael Hill21 Jun 20233 minsIT Training Risk Managementnews Security budget hikes are missing the mark, CISOs sayBy Michael Hill20 Jun 20234 minsCSO and CISORisk Management opinionWhy assessing third parties for security risk is still an unsolved problemBy Andy Ellis 20 Jun 20234 minsRisk Management newsGoogle Cloud launches Cryptomining Protection ProgramBy Samira Sarraf 08 Jun 20233 minsCloud SecurityRisk Management news analysisAccessibility should be a cybersecurity priority, says UK NCSCBy Michael Hill 19 May 20236 minsCSO and CISORisk Management newsOrganizations reporting cyber resilience are hardly resilient: StudyBy Shweta Sharma 18 May 20234 minsCyberattacksRisk Management newsVanta adds new SaaS capability to address growing concerns over vendor securityBy Shweta Sharma 03 May 20233 minsVendor ManagementVendor ManagementVendor Management news analysisOT giants collaborate on ETHOS early threat and attack warning systemBy Cynthia Brumfield 24 Apr 20237 minsThreat and Vulnerability ManagementCritical InfrastructureRisk Management ArticlesnewsPwC UK partners with ReversingLabs to bring software supply chain security to third-party risk managementBy Michael Hill 28 Mar 2023 3 minsData and Information SecurityRisk ManagementSupply ChainnewsTop 10 open source software risks for 2023While open source software is the bedrock of modern software development, it is also the weakest link in the software supply chain, according to a report by Endor Labs.By Apurva Venkat 01 Mar 2023 5 minsOpen SourceRisk ManagementfeatureEconomic pressures are increasing cybersecurity risks; a recession would amp them up moreInsider threats and the rate of successful attacks coupled with corporate cost-cutting efforts have historically hurt cybersecurity programs — and would likely do so again.By Mary K. Pratt 28 Feb 2023 8 minsTechnology IndustryBusiness IT AlignmentData and Information SecurityopinionHow to de-risk your digital ecosystemDigital ecosystems are big, complicated, and a massive vector for exploits and attackers. Santha Subramoni, global head, cybersecurity business unit at Tata Consultancy Services discusses digital ecosystems security and how businesses can lower risk within their digital ecosystems.By Santha Subramoni 28 Feb 2023 10 minsInternet SecurityCritical InfrastructureData and Information Securitynews analysisCyber arms race, economic headwinds among top macro cybersecurity risks for 2023The Bipartisan Policy Center's report on the top eight macro cybersecurity risks highlights how little progress organizations have made in dealing with them. By Cynthia Brumfield 21 Feb 2023 5 minsCSO and CISORisk ManagementfeatureSocial media use can put companies at risk: Here are some ways to mitigate the dangerUsing social media can expose company and employee data, and misuse could harm organizational reputation. Here are some tips that can help reduce the risk.By Susan Bradley 21 Dec 2022 6 minsSocial EngineeringSecurity AuditsRisk ManagementfeatureEPSS explained: How does it compare to CVSS?The Exploit Prediction Scoring System has its shortcomings, but it can complement CVSS to help better prioritize and assess vulnerability risk.By Chris Hughes 24 Nov 2022 7 minsThreat and Vulnerability ManagementRisk ManagementopinionGuilty verdict in the Uber breach case makes personal liability real for CISOsThe conviction of Uber's former CSO could change the roles of top security leaders and raises the level of personal risk in the wake of a breach.By Christopher Burgess 06 Oct 2022 5 minsCSO and CISORisk ManagementfeatureCyber insurance explained: What it covers and why prices continue to riseCyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.By Michael Hill 05 Oct 2022 12 minsRisk Managementfeature8 strange ways employees can (accidently) expose dataFrom eyeglass reflections and new job postings to certificate transparency logs and discarded printers, employees have odd ways to unintentionally expose data..By Michael Hill 04 Oct 2022 10 minsData BreachData BreachData BreachfeatureRecent cases highlight need for insider threat awareness and actionInsider threats can have a devastating impact even if the harm is unintentional. Here's advice to identify and mitigate insider threat risk.By Cynthia Brumfield 29 Sep 2022 7 minsThreat and Vulnerability ManagementThreat and Vulnerability ManagementSecurity SoftwarefeatureThe deepfake danger: When it wasn't you on that Zoom callDeepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.By Deb Radcliff 26 Sep 2022 7 minsAuthenticationRisk Management Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments Sep 17, 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsSupply ChainRisk ManagementSecurity Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsRisk ManagementIT LeadershipSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime