Latest from todaynews analysisAttackers add hacked servers to commercial proxy networks for profitProxyjacking allows attackers to sell unknowing victims' unused network bandwidth.By Lucian Constantin30 Jun 20234 minsCybercrime news Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilitiesnews First state-sponsored cyberattack against UK government revealed two decades laterBy Michael Hill30 Jun 20233 minsCyberattacksGovernment news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source newsNHS data reportedly compromised in University of Manchester cyberattackBy Michael Hill 30 Jun 20234 minsData BreachCyberattacks featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisCenter for Internet Security, CREST launch new enterprise cybersecurity accreditation schemeBy Michael Hill 29 Jun 20234 minsCertificationsIT Skills news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Popular topicsCybercrime news analysisWhy you should review the security of your MSSQL serversBy Lucian Constantin 27 Jun 2023 6 minsCyberattacksData and Information Security newsNew Android banking Trojan targets US, UK, and GermanyBy Apurva Venkat Jun 27, 2023 4 minsAndroid SecurityAndroid SecurityMobile Security news analysisFileless attacks surge as cybercriminals evade cloud security defensesBy Michael Hill Jun 27, 2023 5 minsCyberattacksSupply ChainApplication Security View topic Careers featureSecurity Recruiter DirectoryBy CSO Staff Jun 27, 2023 51 minsCareers newsRecord number enrol in UK's Upskill in Cyber programme to kickstart cybersecurity careersBy Michael Hill 27 Jun 2023 4 minsHiringIT Skills newsFortanix adds confidential data search for encrypted enterprise dataBy Shweta Sharma Jun 27, 2023 3 minsDatabase AdministratorEncryptionCloud Security View topic IT Leadership opinionThe CISO's toolkit must include political capital within the C-suiteBy Christopher Burgess Jun 26, 2023 5 minsCSO and CISOC-SuiteIT Leadership featureCyber liability insurance vs. data breach insurance: What's the difference?By Linda Rosencrance Jun 14, 2023 9 minsInsurance IndustryCyberattacksBusiness IT Alignment newsGoogle launches Secure AI Framework to help secure AI technologyBy Michael Hill Jun 09, 2023 4 minsIT Governance FrameworksGenerative AIArtificial Intelligence View topic The CSO communityWe work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Hear from the Experts newsCybersecurity industry cannot retrofit security into developing AI technology, says UK NCSC chiefUK NCSC CEO Lindy Cameron reflects on the key cybersecurity challenges the UK faces from rapidly developing AI technologies like generative AI and LLMs.By Michael Hill14 Jun 20233 mins Generative AIArtificial Intelligence Read the Article by Michael Hill UK Editor Show me moreLatestArticlesPodcastsVideos brandpost The real impact of cybersecurity breaches on customer trust 30 Jun 20239 mins Cyberattacks opinion Cisco launches new network, security, and observability solutions and previews generative AI capabilities for Webex and Security Cloud By Pete Bartolik 28 Jun 20234 mins Cloud Security brandpost Enhancing cloud infrastructure security via infrastructure as code By Microsoft Security 28 Jun 20235 mins Cloud Security podcast CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO podcast Podcast: Scott Sorley, Executive Director ICT Services at UoSQ 19 Apr 202323 mins Application Security podcast Podcast: Raza Nowrozy, CISO at Untapped Talent 19 Apr 202325 mins Application Security video CSO Executive Sessions Australia with Australian Institute of Company Directors' Marco Figueroa 27 Jun 202324 mins CSO and CISO video CSO Executive Sessions Australia with Gavin Ryan, Global Head of Information Security, Navitas 26 May 202312 mins Application Security video CSO Executive Sessions with Mohammad Firdaus Juhari, Head of Digital Security, edotco Group 23 May 202318 mins Application Security