Latest from todayhow-toHow to configure OAuth in Microsoft 365 Defender and keep your cloud secureWhen it comes to implementing Open Authorization (OAuth) technology, constant monitoring and review is the key to maintaining a properly secure organization.By Susan Bradley27 Feb 20257 minsAccess ControlCloud SecurityWindows Security news whoAMI name confusion attacks can expose AWS accounts to malicious code executionBy Shweta Sharma14 Feb 20253 minsCloud SecurityCyberattacksSecurityhow-to What security teams need to know about the coming demise of old Microsoft serversBy Susan Bradley13 Feb 20256 minsCloud SecurityData and Information SecurityWindows Security opinionThe cloud is not your only option: on-prem security still alive and well in Windows Server 2025By Susan Bradley 06 Feb 20257 minsCloud SecurityData and Information SecurityWindows Security featureCISOs’ top 12 cybersecurity priorities for 2025By Mary K. Pratt 27 Jan 20259 minsCloud SecurityComplianceIT Strategy feature7 top cybersecurity projects for 2025By John Edwards 21 Jan 20258 minsCloud SecurityData and Information SecurityIT Governance newsCISA warns second BeyondTrust vulnerability also exploited in the wildBy Lucian Constantin 15 Jan 20253 minsCloud SecurityVulnerabilities feature7 biggest cybersecurity stories of 2024By John Leyden 24 Dec 202410 minsData BreachRansomwareRegulation newsUS order is a reminder that cloud platforms aren’t secure out of the boxBy Howard Solomon 20 Dec 20245 minsCloud SecurityGovernment IT ArticlesopinionEnhance Microsoft security by ditching your hybrid setup for Entra-only joinPrepare now for the eventual end of Microsoft Active Directory as it’s phased out in favor of the more secure, less risky Entra. By Susan Bradley 20 Dec 2024 7 minsCloud SecuritySecurity PracticesWindows SecurityfeatureKey strategies to enhance cyber resilienceTo avoid costly downtime and brand reputational damage security experts offer four key measures to ensure the minimal amount of downtime possible during an unplanned event.By Jaikumar Vijayan 18 Dec 2024 7 minsCloud SecurityCyberattacksData and Information SecuritynewsUS moves to tighten restrictions on China Telecom amid security fearsLast week, the government issued a preliminary ruling deeming China Telecom Americas’ US network and cloud operations a national security risk.By Prasanth Aby Thomas 17 Dec 2024 1 minCloud SecuritySecurityTelecommunications IndustrynewsBlack Hat: Latest news and insightsThe Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know.By CSO Staff 16 Dec 2024 5 minsAdvanced Persistent ThreatsBlack HatThreat and Vulnerability ManagementbrandpostSponsored by FortinetGuarding against AI-powered threats requires a focus on cyber awarenessWhether executives are developing a new cyber education effort or refreshing an existing program, there are key attributes to consider that will increase the endeavor’s chances of being successful. By Rob Rashotte 16 Dec 2024 5 minsCloud SecuritybrandpostSponsored by FortinetCatching the ghost in the machine: Adapting threat detection to cloud speedThe ghost in the machine thrives in complexity, exploiting disjointed systems, fragmented visibility, and identity weaknesses to evade detection. To stay ahead, organizations must embrace strategies that combine advanced detection capabilities with operational simplicity.By Vince Hwang 16 Dec 2024 6 minsCloud SecuritynewsAmazon refuses Microsoft 365 deployment because of lax cybersecuritySecurity executives applaud Amazon for publicly shaming Microsoft security, although some suspect it is a thinly veiled AWS sales pitch.By Evan Schuman 16 Dec 2024 5 minsAccess ControlApplication SecurityCloud SecurityfeatureThe 7 most in-demand cybersecurity skills todayEvolving IT strategies and emerging technologies and threats have organizations shuffling their cyber skills want lists, according to a recent survey of IT security managers conducted by ISC2.By Eric Frank 12 Dec 2024 11 minsApplication SecurityCloud SecurityCompliancenewsFortinet offers integrated cloud app security serviceFortiAppSec Cloud combines web and API security, server load balancing, and threat analytics under a single console.By Michael Cooney 04 Dec 2024 1 minCloud Securityhow-toDownload the Cloud Optimization Enterprise SpotlightFrom our editors: We look at how IT leaders are reworking their cloud implementations for better fit to their needs, as well as how they can control cloud costs and ensure cloud security.By CIO.com and CSOonline.com staff 02 Dec 2024 1 minCloud SecurityIT StrategynewsAWS launches tools to tackle evolving cloud security threatsAI-driven detection and automated response aim to improve visibility and incident management for enterprises.By Gyana Swain 02 Dec 2024 4 minsAmazon re:InventCloud SecurityIntrusion Detection SoftwarefeatureSecurity-FinOps collaboration can reap hidden cloud benefits: 11 tipsIn the cloud, financial efficiency and robust security are two key priorities. Breaking down silos between FinOps and cyber teams can provide synergies hidden in plain sight.By Will Kelly 29 Nov 2024 9 minsCloud SecuritySecurity Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsApplication SecurityFirewalls DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsApplication SecurityData BreachHacking Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud ComputingCloud SecuritySecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphonesSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain