featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Apr 202417 minsTechnology IndustryIT SkillsEvents news Top cybersecurity product news of the weekBy CSO staff29 Mar 202470 minsGenerative AISecuritynews Cisco: Security teams are ‘overconfident’ about handling next-gen threatsBy Jon Gold28 Mar 20243 minsSecurity brandpostSponsored by Palo Alto NetworksA Zero Trust approach for remote access in utilities is essentialBy Anand Oswal, senior vice president of product, network security, Palo Alto Networks 28 Mar 20245 minsSecurity brandpostSponsored by Palo Alto NetworksWhat vulnerabilities are obscured by your cloud environments?By Pete Bartolik 26 Mar 20244 minsSecurity brandpostSponsored by SophosStudy: Cybersecurity burnout impacts 88% of cybersecurity and IT roles in Singapore. What can you do as an MSP to help?By Sophos 24 Mar 20243 minsCyberattacksSecurity brandpostSponsored by FortinetAddressing cyber challenges through public-private partnershipsBy Jim Richberg 19 Mar 20246 minsSecurity brandpostSponsored by TorqHow AI-Driven Hyperautomation Can Ease Alert FatigueBy Torq 13 Mar 20244 minsBuild AutomationSecurity featureWhat is SIEM? How to choose the right one for your businessBy Josh Fruhlinger and Tim Ferrill 13 Mar 202412 minsSecurity Information and Event Management SoftwareNetwork SecuritySecurity ArticlesbrandpostSponsored by Palo Alto NetworksWhy you need a platform approach to securityToday's enterprises mix networks, applications, data, and locations. Here’s how a platform security solution can help fill the security gaps. By Pete Bartolik 11 Mar 2024 4 minsSecuritybrandpostSponsored by FortinetBotnets: The uninvited guests that just won’t leaveAccording to a new study, botnets are lingering on networks longer than ever before being detected, creating even greater risks for businesses. So what’s your next move?By Derek Manky, Chief Security Strategist & Global Vice President of Threat Intelligence, FortiGuard Labs 08 Mar 2024 6 minsSecuritybrandpostSponsored by Palo Alto NetworksWatching the bottom line—How a Zero Trust position can save time and money Today’s security solutions can enable better, faster ROI. Read on to learn more. By Navneet Singh, Vice President of Marketing, Network Security, Palo Alto Networks 06 Mar 2024 6 minsSecurityfeature30 years of the CISO role – how things have changed since Steve KatzThe first-ever CISO was mostly a technically oriented executive. They’ve since evolved into masters of risk management, threat mitigation, regulatory compliance, data privacy, and much more.By Christine Wong 04 Mar 2024 9 minsCSO and CISOSecurity PracticesIT LeadershipbrandpostSponsored by Palo Alto NetworksHow will AI change the security operations center?The challenges facing security operations center teams are real. The answer lies in artificial intelligence, which will supercharge SOC modernization efforts.By Pete Bartolik 27 Feb 2024 4 minsSecuritynews analysisNIST releases expanded 2.0 version of the Cybersecurity FrameworkThe US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.By Cynthia Brumfield 27 Feb 2024 6 minsIT Governance FrameworksSupply ChainCritical InfrastructurefeatureWhat is phishing? Examples, types, and techniquesPhishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.By Christine Wong 20 Feb 2024 10 minsPhishingSocial EngineeringNetwork SecuritynewsHackers paralyze battery maker Varta in cyberattackFollowing an attack on its IT systems, Varta had to shut down its production and administration and take it offline. By Martin Bayer 14 Feb 2024 2 minsManufacturing IndustryCyberattacksSecuritynewsAI adoption in security taking off amid budget, trust, and skill-based issuesDefensive AI emerged as a critical AI use, with 58% of respondents to a survey saying their organization is investing in AI to stop AI-based attacks.By Shweta Sharma 13 Feb 2024 4 minsSecuritybrandpostSponsored by Palo Alto NetworksHow is IR sniping and AI changing the game in today’s ever-evolving threat situation?IR sniping and the transformative function of AI make cybersecurity much more effective—it’s time to find out why.By Palo Alto Networks 01 Feb 2024 4 minsSecuritybrandpostSponsored by Palo Alto NetworksSafeguarding the healthcare sector with dynamic cybersecurityThere are robust strategies cybersecurity leaders can use to support the delivery of secure, high-quality, modern healthcare.By Wendy Roodhooft is Security Officer at AZ Vesalius, a leading hospital in Belgium. 31 Jan 2024 6 minsSecuritybrandpostSponsored by Palo Alto NetworksWhat IT Leaders should appreciate about SOAR in 2024SOAR allows organizations to not only quickly respond to cybersecurity attacks, but also observe, understand, and prevent future incidents, thus improving their overall security posture.By Zachary Malone, Technical Enablement Architect, Palo Alto Networks 31 Jan 2024 5 minsSecurity Show more Show less View all Resources whitepaper The Future of Passwords May Be Passwordless This webinar examines the evolution of passwordless authentication and discusses what it means for both organizations and users. The post The Future of Passwords May Be Passwordless appeared first on Whitepaper Repository –. By LastPass 12 Feb 2024CybercrimePasswordsSecurity whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers news analysis Thousands of servers hacked due to insecurely deployed Ray AI framework By Lucian Constantin 28 Mar 20244 mins Vulnerabilities podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence