brandpostSponsored by CorelliumShifting security left: DevSecOps meets virtualizationBy Anthony Ricco, CMO of Corellium. 01 Jul 20234 minsSecurity news analysis Attackers add hacked servers to commercial proxy networks for profitBy Lucian Constantin30 Jun 20234 minsCybercrimenews Command-and-control framework PhonyC2 attributed to Iran’s Muddywater groupBy Apurva Venkat30 Jun 20234 minsAdvanced Persistent ThreatsCyberattacksVulnerabilities news analysisMission Linux: How the open source software is now a lucrative target for hackersBy Apurva Venkat 30 Jun 20234 minsRansomwareMalwareOpen Source featureTop cybersecurity M&A deals for 2023By CSO Staff 30 Jun 202314 minsMergers and AcquisitionsData and Information SecurityIT Leadership news analysisNpm ecosystem vulnerable to new manifest confusion attackBy Lucian Constantin 29 Jun 20236 minsDevSecOpsVulnerabilitiesOpen Source news analysisNo consensus on creating a unified US cyber incident reporting frameworkBy Cynthia Brumfield 29 Jun 202310 minsRegulationRansomwareCompliance newsPerception Point unveils new detection model to tackle generative AI BEC attacksBy Michael Hill 29 Jun 20233 minsIntrusion Detection SoftwareIntrusion Detection SoftwareIntrusion Detection Software newsNew ransomware group starts to wreak havocBy Apurva Venkat 29 Jun 20234 minsRansomwareCyberattacks ArticlesbrandpostSponsored by FortinetEffective security training programs are vital to creating a cyber-aware workforceCreating and maintaining a comprehensive training program increases the likelihood that employees have the necessary insight to identify potential attacks.By Rob Rashotte 26 Jun 2023 5 minsSecurityopinionThe CISO’s toolkit must include political capital within the C-suiteEffective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.By Christopher Burgess 26 Jun 2023 5 minsCSO and CISOC-SuiteIT LeadershipbrandpostSponsored by CiscoCisco Secure Access: secure connectivity from anything to anywhere from everywhereCisco Secure Access manages policies that govern network connections, making life better and easier for users and IT alike.By Jeff Schaeffer, VP of Security Service Edge (SSE), Cisco 23 Jun 2023 3 minsSecuritybrandpostSponsored by FortinetReducing cyber risks by upskilling your security talentThe threat landscape is moving at such an unprecedented pace that even the most well-staffed enterprises are finding it difficult to effectively protect their digital assets.By Rob Rashotte 22 Jun 2023 5 minsSecurityfeatureTo solve the cybersecurity worker gap, forget the job title and search for the skills you needCISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help them get their cybersecurity work done.By Mary K. Pratt 12 Jun 2023 11 minsHiringIT SkillsIT Training featureCybersecurity startups to watch for in 2023These startups are jumping in where most established security vendors have yet to go.By CSO Staff 09 Jun 2023 11 minsCSO and CISOSecurityopinionDepartment of Defense AI principles have a place in the CISO's playbookBy Christopher Burgess 06 Jun 2023 5 minsCSO and CISOAerospace and Defense IndustryArtificial Intelligencefeature10 notable critical infrastructure cybersecurity initiatives in 2023How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.By Michael Hill 05 Jun 2023 9 minsGovernmentCritical InfrastructureData and Information SecuritynewsISACA pledges to help grow cybersecurity workforce in EuropeISACA will provide 20,000 free memberships to students across Europe and support the identification of qualified cybersecurity candidates for organizations.By Michael Hill 01 Jun 2023 3 minsHiringCareersSecurityopinionInsider risk management: Where your program resides shapes its focusChoosing which department should be responsible for protecting an organization from threats from within isn’t always straightforward. By Christopher Burgess 29 May 2023 6 minsThreat and Vulnerability ManagementSecurityfeature6 ways generative AI chatbots and LLMs can enhance cybersecurityGenerative AI chatbots and large language models can be a double-edged swords from a risk perspective, but with proper use they can also improve cybersecurity in key waysBy Michael Hill 25 May 2023 7 minsGenerative AIGenerative AIGenerative AIreviewsThe 6 best password managers for businessA password manager can help you implement strong passwords everywhere for your business. Here are the features to look for and top choices for business use.By Josh Fruhlinger and Tim Ferrill 11 May 2023 11 minsSmall and Medium BusinessSmall and Medium BusinessSmall and Medium Business Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity whitepaper 7 Common Ways Ransomware Can Infect Your Organisation By Sentinel One 31 Oct 2022CybercrimeRansomwareSecurity View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoCSO Executive Sessions / ASEAN: Hieu Minh Ngo on top cybersecurity vulnerabilities to watch out forHieu Minh Ngo - Cybersecurity Specialist at the National Cyber Security Center of Vietnam - joins Xiou Ann Lim for this CSO Executive Sessions interview. 19 Apr 2023 17 minsHackingSecurity CSO Executive Sessions / ASEAN: Francis Yeow on talent 05 Apr 2023 17 minsIT LeadershipSecurity CSO Executive Sessions / ASEAN: Huang Shao Fei on AI and other technologies 22 Mar 2023 17 minsEmerging TechnologySecurity CSO Executive Sessions / ASEAN: Eddie Hau on cybersecurity as a business enabler for diversified businesses 15 Mar 2023 15 minsEducation IndustryHealthcare IndustrySecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime