Latest from todaynews analysisAttackers add hacked servers to commercial proxy networks for profitProxyjacking allows attackers to sell unknowing victims' unused network bandwidth.By Lucian Constantin30 Jun 20234 minsCybercrime news Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilitiesnews analysis Mission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat30 Jun 20234 minsRansomwareMalwareOpen Source featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisCenter for Internet Security, CREST launch new enterprise cybersecurity accreditation schemeBy Michael Hill 29 Jun 20234 minsCertificationsIT Skills news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsPerception Point unveils new detection model to tackle generative AI BEC attacksBy Michael Hill 29 Jun 20233 minsIntrusion Detection SoftwareIntrusion Detection SoftwareIntrusion Detection Software newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Popular topicsCybercrime newsNew Android banking Trojan targets US, UK, and GermanyBy Apurva Venkat Jun 27, 2023 4 minsAndroid SecurityAndroid SecurityMobile Security news analysisFileless attacks surge as cybercriminals evade cloud security defensesBy Michael Hill Jun 27, 2023 5 minsCyberattacksSupply ChainApplication Security news analysisCritical flaw in VMware Aria Operations for Networks sees mass exploitationBy Lucian Constantin 26 Jun 2023 3 minsCyberattacksNetwork SecurityVulnerabilities View topic Careers newsFortanix adds confidential data search for encrypted enterprise dataBy Shweta Sharma Jun 27, 2023 3 minsDatabase AdministratorEncryptionCloud Security opinionThe CISO's toolkit must include political capital within the C-suiteBy Christopher Burgess Jun 26, 2023 5 minsCSO and CISOC-SuiteIT Leadership featureHow CISOs can balance the risks and benefits of AIBy Maria Korolov 26 Jun 2023 10 minsCSO and CISORisk Management View topic IT Leadership featureCyber liability insurance vs. data breach insurance: What's the difference?By Linda Rosencrance Jun 14, 2023 9 minsInsurance IndustryCyberattacksBusiness IT Alignment newsGoogle launches Secure AI Framework to help secure AI technologyBy Michael Hill Jun 09, 2023 4 minsIT Governance FrameworksGenerative AIArtificial Intelligence featureShadow IT is increasing and so are the associated security risksBy Mary K. Pratt Jun 06, 2023 8 minsIoT SecurityBusiness IT AlignmentCloud Security View topic The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Hear from the Experts featureSkilling up the security team for the AI-dominated eraDefending against AI-enabled attackers and hardening enterprise AI systems will require new security skills. Threat hunters, data scientists, developers and prompt engineers are part of the answer.By Ericka Chickowski03 May 20239 mins Generative AIIT SkillsIT Training Read the Article by Ericka Chickowski CSO contributor Show me moreLatestArticlesPodcastsVideos news First state-sponsored cyberattack against UK government revealed two decades later By Michael Hill 30 Jun 20233 mins CyberattacksGovernment news NHS data reportedly compromised in University of Manchester cyberattack By Michael Hill 30 Jun 20234 mins Data BreachCyberattacks brandpost The real impact of cybersecurity breaches on customer trust 30 Jun 20239 mins Cyberattacks podcast CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO podcast Podcast: Scott Sorley, Executive Director ICT Services at UoSQ 19 Apr 202323 mins Application Security podcast Podcast: Raza Nowrozy, CISO at Untapped Talent 19 Apr 202325 mins Application Security video CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO video CSO Executive Sessions Australia with Gavin Ryan, Global Head of Information Security, Navitas 26 May 202312 mins Application Security video CSO Executive Sessions with Mohammad Firdaus Juhari, Head of Digital Security, edotco Group 23 May 202318 mins Application Security