Latest from todaynewsLinux, macOS users infected with malware posing as legitimate Go packagesThreat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.By Shweta Sharma07 Mar 20253 minsMalwareSecurity news US charges 12 Chinese hackers in major government-backed espionage campaignBy Gyana Swain06 Mar 20255 minsCybercrimeSecuritynews Badbox Android botnet disrupted through coordinated threat huntingBy Shweta Sharma06 Mar 20254 minsAndroid SecuritySecurity opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 20258 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management newsRansomware goes postal: US healthcare firms receive fake extortion lettersBy John E. Dunn 05 Mar 20256 minsRansomwareSecurity newsCritical vulnerabilities expose network security risks in Keysight's infrastructureBy Gyana Swain 05 Mar 20254 minsSecurityVulnerabilities newsChinese cyber espionage growing across all industry sectorsBy Lucian Constantin 05 Mar 20256 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability Management brandpostSponsored by CyberNewsWireHunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC AutomationBy Cyber NewsWire – Paid Press Release 05 Mar 20255 minsCyberattacksSecurity newsVMware ESXi gets critical patches for in-the-wild virtual machine escape attackBy Lucian Constantin 04 Mar 20254 minsSecurityZero-Day Vulnerabilities ArticlesnewsMisconfigured access management systems expose global enterprises to security risksWidespread AMS vulnerabilities threaten physical and data security across key industries.By Gyana Swain 04 Mar 2025 4 minsAccess ControlIdentity and Access ManagementSecurityfeature7 key trends defining the cybersecurity market todayHere’s what CISOs should know about the industry’s evolutions, as top vendors fortify platform strategies, upstarts attract VC investment, and product categories blur and emerge.By Neal Weinberg 04 Mar 2025 9 minsIntrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture CapitalnewsManufacturers still poorly prepared for cyberattacks as IT/OT convergeA global survey shows that less than half of manufacturing companies are prepared for the rising onslaught of cyberattacks against them. By Julia Mutzbauer 04 Mar 2025 3 minsManufacturing IndustrySecuritybrandpostSponsored by CyberNewsWireBubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032By Cyber NewsWire – Paid Press Release 03 Mar 2025 4 minsCyberattacksSecuritynewsCISOs should address identity management 'as fast as they can’ says CrowdStrike execThreat actors increasingly using stolen credentials to compromise cloud assets, warns the company's annual threat report.By Howard Solomon 03 Mar 2025 5 minsCyberattacksSecurityfeatureWhy cyber attackers are targeting your solar energy systems — and how to stop themBusinesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.By Michael Nadeau 03 Mar 2025 13 minsCritical InfrastructureSecurityUtilities IndustrybrandpostSponsored by TaniumIs your enterprise ‘cyber resilient’? Probably not. Here’s how other boards fixed thatA strategy that’s been around for 20+ years but only now gaining traction ensures that when (not if) breaches occur, the impact on operations, reputation, and finances is minimized. Here’s why a cyber resilience scorecard is a key tool for any recovery plan.By Tony Bradley 28 Feb 2025 8 minsSecurityfeatureWhat is zero trust? The security model for a distributed and risky eraA zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach. By Josh Fruhlinger 28 Feb 2025 10 minsAccess ControlIdentity and Access ManagementZero TrustfeatureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff 28 Feb 2025 10 minsApplication SecurityEventsTechnology IndustrybrandpostSponsored by TaniumHow to fill the cyber talent gap? Get realResults from this ISACA survey point to a key reason for chronic understaffing. Hint: Enterprise leaders and HR may be promoting a lopsided notion about “entry-level.”By Bruce Rule 26 Feb 2025 6 minsSecurityopinionWhat CISOs need from the board: Mutual respect on expectationsCISOs shouldn’t be shy about what they need from the board, as organizations with mutual board-CISO understanding are better positioned to tackle cybersecurity challenges successfully.By David Gee 26 Feb 2025 6 minsBusiness IT AlignmentCSO and CISOCompliancefeatureHow to create an effective incident response planTo ensure minimal business disruption, CISOs must have the right incident recovery strategies, roles, and processes in place. Security experts share tips on assembling your playbook.By Bob Violino 25 Feb 2025 11 minsIT LeadershipIncident ResponseSecurity Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins CSO and CISOMultifactor AuthenticationRemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsHPSecurityZero Trust Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsSecurityThreat and Vulnerability ManagementSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management news analysis Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access By Lucian Constantin 06 Mar 20256 mins Advanced Persistent ThreatsGovernmentHacker Groups podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain