featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Apr 202417 minsTechnology IndustryIT SkillsEvents news Top cybersecurity product news of the weekBy CSO staff29 Mar 202470 minsGenerative AISecuritynews Cisco: Security teams are ‘overconfident’ about handling next-gen threatsBy Jon Gold28 Mar 20243 minsSecurity brandpostSponsored by Palo Alto NetworksA Zero Trust approach for remote access in utilities is essentialBy Anand Oswal, senior vice president of product, network security, Palo Alto Networks 28 Mar 20245 minsSecurity brandpostSponsored by Palo Alto NetworksWhat vulnerabilities are obscured by your cloud environments?By Pete Bartolik 26 Mar 20244 minsSecurity brandpostSponsored by SophosStudy: Cybersecurity burnout impacts 88% of cybersecurity and IT roles in Singapore. What can you do as an MSP to help?By Sophos 24 Mar 20243 minsCyberattacksSecurity brandpostSponsored by FortinetAddressing cyber challenges through public-private partnershipsBy Jim Richberg 19 Mar 20246 minsSecurity brandpostSponsored by TorqHow AI-Driven Hyperautomation Can Ease Alert FatigueBy Torq 13 Mar 20244 minsBuild AutomationSecurity featureWhat is SIEM? How to choose the right one for your businessBy Josh Fruhlinger and Tim Ferrill 13 Mar 202412 minsSecurity Information and Event Management SoftwareNetwork SecuritySecurity ArticlesbrandpostSponsored by Microsoft SecurityIran’s evolving influence operations and cyberattacks support HamasUnderstanding how Iranian and Iran-affiliated threats traverse 3 distinct phases may help identify vulnerabilities and attack vectors. By Microsoft Security 28 Mar 2024 5 minsSecuritybrandpostSponsored by Microsoft SecurityWant to build impact as a CISO? Choose CNAPP as your solutionLearn how CISOs can advance and drive a more secure cloud state in 2024 and beyond. By Yuri Diogenes 26 Mar 2024 4 minsSecuritybrandpostSponsored by Microsoft SecurityAdapting to a new era of cybersecurity in the age of AICybersecurity is undergoing a massive transformation, and AI is at the forefront of that change.By Microsoft Security 26 Mar 2024 4 minsSecuritybrandpostSponsored by Palo Alto NetworksWhy you need a platform approach to securityToday's enterprises mix networks, applications, data, and locations. Here’s how a platform security solution can help fill the security gaps. By Pete Bartolik 11 Mar 2024 4 minsSecuritybrandpostSponsored by FortinetBotnets: The uninvited guests that just won’t leaveAccording to a new study, botnets are lingering on networks longer than ever before being detected, creating even greater risks for businesses. So what’s your next move?By Derek Manky, Chief Security Strategist & Global Vice President of Threat Intelligence, FortiGuard Labs 08 Mar 2024 6 minsSecuritybrandpostSponsored by Palo Alto NetworksWatching the bottom line—How a Zero Trust position can save time and money Today’s security solutions can enable better, faster ROI. Read on to learn more. By Navneet Singh, Vice President of Marketing, Network Security, Palo Alto Networks 06 Mar 2024 6 minsSecuritybrandpostSponsored by Microsoft SecurityHow attackers leverage social engineering for greater scamming successIt’s time to take a closer look at social engineering attacks and investigate strategies organizations can utilize to guard against future pressure to manipulate human behaviors. By Microsoft Security 04 Mar 2024 6 minsSecurityfeature30 years of the CISO role – how things have changed since Steve KatzThe first-ever CISO was mostly a technically oriented executive. They’ve since evolved into masters of risk management, threat mitigation, regulatory compliance, data privacy, and much more.By Christine Wong 04 Mar 2024 9 minsCSO and CISOSecurity PracticesIT LeadershipbrandpostSponsored by Palo Alto NetworksHow will AI change the security operations center?The challenges facing security operations center teams are real. The answer lies in artificial intelligence, which will supercharge SOC modernization efforts.By Pete Bartolik 27 Feb 2024 4 minsSecuritynews analysisNIST releases expanded 2.0 version of the Cybersecurity FrameworkThe US National Institute of Standards and Technology released the 2.0 version of its Cybersecurity Framework, focusing more on governance and supply chain issues and offering resources to speed the framework’s implementation.By Cynthia Brumfield 27 Feb 2024 6 minsIT Governance FrameworksSupply ChainCritical InfrastructurefeatureWhat is phishing? Examples, types, and techniquesPhishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.By Christine Wong 20 Feb 2024 10 minsPhishingSocial EngineeringNetwork SecuritynewsHackers paralyze battery maker Varta in cyberattackFollowing an attack on its IT systems, Varta had to shut down its production and administration and take it offline. By Martin Bayer 14 Feb 2024 2 minsManufacturing IndustryCyberattacksSecurity Show more Show less View all Resources whitepaper The Long Road Ahead to Ransomware Preparedness The ransomware threat is a top-of-mind issue for so many organizations; however, few feel totally prepared for an attack. The post The Long Road Ahead to Ransomware Preparedness appeared first on Whitepaper Repository –. By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers news analysis Thousands of servers hacked due to insecurely deployed Ray AI framework By Lucian Constantin 28 Mar 20244 mins Vulnerabilities podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence