Latest from todaynewsLinux, macOS users infected with malware posing as legitimate Go packagesThreat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.By Shweta Sharma07 Mar 20253 minsMalwareSecurity news US charges 12 Chinese hackers in major government-backed espionage campaignBy Gyana Swain06 Mar 20255 minsCybercrimeSecuritynews Badbox Android botnet disrupted through coordinated threat huntingBy Shweta Sharma06 Mar 20254 minsAndroid SecuritySecurity opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 20258 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management newsRansomware goes postal: US healthcare firms receive fake extortion lettersBy John E. Dunn 05 Mar 20256 minsRansomwareSecurity newsCritical vulnerabilities expose network security risks in Keysight's infrastructureBy Gyana Swain 05 Mar 20254 minsSecurityVulnerabilities newsChinese cyber espionage growing across all industry sectorsBy Lucian Constantin 05 Mar 20256 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability Management brandpostSponsored by CyberNewsWireHunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC AutomationBy Cyber NewsWire – Paid Press Release 05 Mar 20255 minsCyberattacksSecurity newsVMware ESXi gets critical patches for in-the-wild virtual machine escape attackBy Lucian Constantin 04 Mar 20254 minsSecurityZero-Day Vulnerabilities ArticlesnewsMisconfigured access management systems expose global enterprises to security risksWidespread AMS vulnerabilities threaten physical and data security across key industries.By Gyana Swain 04 Mar 2025 4 minsAccess ControlIdentity and Access ManagementSecurityfeature7 key trends defining the cybersecurity market todayHere’s what CISOs should know about the industry’s evolutions, as top vendors fortify platform strategies, upstarts attract VC investment, and product categories blur and emerge.By Neal Weinberg 04 Mar 2025 9 minsIntrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture CapitalnewsManufacturers still poorly prepared for cyberattacks as IT/OT convergeA global survey shows that less than half of manufacturing companies are prepared for the rising onslaught of cyberattacks against them. By Julia Mutzbauer 04 Mar 2025 3 minsManufacturing IndustrySecuritybrandpostSponsored by CyberNewsWireBubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032By Cyber NewsWire – Paid Press Release 03 Mar 2025 4 minsCyberattacksSecuritynewsCISOs should address identity management 'as fast as they can’ says CrowdStrike execThreat actors increasingly using stolen credentials to compromise cloud assets, warns the company's annual threat report.By Howard Solomon 03 Mar 2025 5 minsCyberattacksSecurityfeatureWhy cyber attackers are targeting your solar energy systems — and how to stop themBusinesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.By Michael Nadeau 03 Mar 2025 13 minsCritical InfrastructureSecurityUtilities IndustryfeatureWhat is zero trust? The security model for a distributed and risky eraA zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach. By Josh Fruhlinger 28 Feb 2025 10 minsAccess ControlIdentity and Access ManagementZero TrustfeatureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff 28 Feb 2025 10 minsApplication SecurityEventsTechnology IndustryopinionWhat CISOs need from the board: Mutual respect on expectationsCISOs shouldn’t be shy about what they need from the board, as organizations with mutual board-CISO understanding are better positioned to tackle cybersecurity challenges successfully.By David Gee 26 Feb 2025 6 minsBusiness IT AlignmentCSO and CISOCompliancefeatureHow to create an effective incident response planTo ensure minimal business disruption, CISOs must have the right incident recovery strategies, roles, and processes in place. Security experts share tips on assembling your playbook.By Bob Violino 25 Feb 2025 11 minsIT LeadershipIncident ResponseSecuritynewsBybit’s $1.5B hack linked to North Korea’s Lazarus groupInvestigation revealed that BingX, & Phemex hacks were also connected to the same cluster as Bybit's, confirming the threat actor’s identity as the Lazarus group. By Shweta Sharma 24 Feb 2025 3 minsHacker GroupsSecuritynewsAI can kill banks: Cybersecurity’s disinformation gapPanicking bank customers is neither difficult nor expensive, as a recent study shows, suggesting that CISOs must also keep disinformation campaigns in mind.By Florian Maier 24 Feb 2025 2 minsFinancial Services IndustryGenerative AISecurity Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsHPSecurityZero Trust Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsSecurityThreat and Vulnerability ManagementSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management news analysis Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access By Lucian Constantin 06 Mar 20256 mins Advanced Persistent ThreatsGovernmentHacker Groups podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain