Latest from todayopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess26 Jun 20235 minsCSO and CISOC-SuiteIT Leadership news SEC notice to SolarWinds CISO and CFO roils cybersecurity industryBy Apurva Venkat27 Jun 20235 minsCSO and CISOData BreachLegalnews analysis Why you should review the security of your MSSQL serversBy Lucian Constantin27 Jun 20236 minsCyberattacksData and Information Security newsSurvey reveals mass concern over generative AI security risksBy Michael Hill 27 Jun 20233 minsGenerative AISecurity newsBionic integrations offer context-based vulnerability managementBy Shweta Sharma 27 Jun 20233 minsThreat and Vulnerability Management newsLatest MOVEit exploit hits thousands of NYC school students and staffBy Shweta Sharma 26 Jun 20233 minsData Breach newsMillions of GitHub repositories vulnerable to RepoJacking: ReportBy Apurva Venkat 23 Jun 20234 minsMalwareGitHubVulnerabilities newsFortanix adds confidential data search for encrypted enterprise dataBy Shweta Sharma 27 Jun 20233 minsDatabase AdministratorEncryptionCloud Security Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Popular topicsCybercrime news analysisAttackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin 30 Jun 2023 4 minsCybercrime newsCommand-and-control framework PhonyC2 attributed to Iran's Muddywater groupBy Apurva Venkat 30 Jun 2023 4 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 2023 4 minsRansomwareMalwareOpen Source View topic Careers news analysisCenter for Internet Security, CREST launch new enterprise cybersecurity accreditation schemeBy Michael Hill 29 Jun 2023 4 minsCertificationsIT Skills newsAttack surface visibility a top CISO priority amid growing attacks: ReportBy Shweta Sharma Jun 28, 2023 4 minsCSO and CISOCyberattacks featureThe CSO guide to top security conferencesBy CSO Staff 28 Jun 2023 22 minsTechnology IndustryIT SkillsEvents View topic IT Leadership featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 2023 14 minsMergers and AcquisitionsData and Information SecurityIT Leadership featureHow the new deepfake reality will impact cyber insuranceBy Deb Radcliff 29 Jun 2023 8 minsInsurance IndustryCybercrimeData and Information Security featureCyber liability insurance vs. data breach insurance: What's the difference?By Linda Rosencrance Jun 14, 2023 9 minsInsurance IndustryCyberattacksBusiness IT Alignment View topic The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Hear from the Experts news analysisBusiness email compromise scams take new dimension with multi-stage attacksA new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication.By Lucian Constantin12 Jun 20236 mins Email SecurityCyberattacksCybercrime Read the Article by Lucian Constantin CSO Senior Writer Show me moreLatestArticlesPodcastsVideos brandpost Shifting security left: DevSecOps meets virtualization By Anthony Ricco, CMO of Corellium. 01 Jul 20234 mins Security news First state-sponsored cyberattack against UK government revealed two decades later By Michael Hill 30 Jun 20233 mins CyberattacksGovernment news NHS data reportedly compromised in University of Manchester cyberattack By Michael Hill 30 Jun 20234 mins Data BreachCyberattacks podcast CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO podcast Podcast: Scott Sorley, Executive Director ICT Services at UoSQ 19 Apr 202323 mins Application Security podcast Podcast: Raza Nowrozy, CISO at Untapped Talent 19 Apr 202325 mins Application Security video CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO video CSO Executive Sessions Australia with Gavin Ryan, Global Head of Information Security, Navitas 26 May 202312 mins Application Security video CSO Executive Sessions with Mohammad Firdaus Juhari, Head of Digital Security, edotco Group 23 May 202318 mins Application Security