Editor’s picks: Managing modern risksfeatureDownload the AI Risk Management Enterprise Spotlight We explore the risks to both IT and the business from the use of AI. The goal of your risk management efforts should be to gain the most value from AI as a result.By CSOonline.com and CIO.com staff03 Mar 20251 minRisk Management feature Understanding OWASP’s Top 10 list of non-human identity critical risksBy Chris Hughes20 Feb 202513 minsData and Information SecurityIdentity and Access ManagementRisk Managementfeature How CISOs can rebuild trust after a security incidentBy Eric Frank18 Feb 202510 minsBusiness IT AlignmentCSO and CISOIncident Response featureHow to evaluate and mitigate risks to the global supply chainBy Jaikumar Vijayan 17 Feb 20257 minsCyberattacksRisk ManagementSupply Chain news analysis39% of IT leaders fear major incident due to excessive workloadsBy Evan Schuman 03 Feb 20256 minsIT SkillsIncident ResponseSecurity Operations Center featureHow organizations can secure their AI-generated codeBy Andrada Fiscutean 20 Jan 202510 minsApplication SecuritySoftware Development featureStop wasting money on ineffective threat intelligence: 5 mistakes to avoidBy Ericka Chickowski 15 Jan 202510 minsBudgetRisk ManagementThreat and Vulnerability Management newsGenAI strategies put CISOs in a stressful bindBy Evan Schuman 14 Jan 20255 minsCSO and CISOGenerative AIRisk Management featureCISOs embrace rise in prominence — with broader business authorityBy Esther Shein 13 Jan 202511 minsBusiness IT AlignmentCSO and CISOIT Strategy Enterprise Buyer’s Guides How-To DSPM buyer’s guide: Top 12 data security posture management tools DSPM tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data loss 02 Apr 2024 14 mins Data and Information Security Enterprise Buyer’s Guides Risk Management How-To Buyer’s guide: How to choose a certificate management tool 19 May 2022 11 mins Encryption Enterprise Buyer’s Guides Internet Security Latest from todaynewsLinux, macOS users infected with malware posing as legitimate Go packagesThreat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.By Shweta Sharma07 Mar 20253 minsMalwareSecurity feature 8 obstacles women still face when seeking a leadership role in ITBy Christina Wood07 Mar 20258 minsCareersIT Leadershipfeature What is risk management? Quantifying and mitigating uncertaintyBy Josh Fruhlinger07 Mar 202510 minsIT Governance FrameworksIT LeadershipRisk Management news analysisChinese APT Silk Typhoon exploits IT supply chain weaknesses for initial accessBy Lucian Constantin 06 Mar 20256 minsAdvanced Persistent ThreatsGovernmentHacker Groups newsUS charges 12 Chinese hackers in major government-backed espionage campaignBy Gyana Swain 06 Mar 20255 minsCybercrimeSecurity newsBadbox Android botnet disrupted through coordinated threat huntingBy Shweta Sharma 06 Mar 20254 minsAndroid SecuritySecurity news analysis60% of cybersecurity pros looking to change employersBy John Leyden 06 Mar 20255 minsCareersIT Leadership opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 20258 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management newsRansomware goes postal: US healthcare firms receive fake extortion lettersBy John E. Dunn 05 Mar 20256 minsRansomwareSecurity ArticlesopinionDOGE’s US worker purge has created a spike in insider riskSummarily firing workers who have access to national secrets is creating a nearly unprecedented environment for classified data exposure, writes CIA Distinguished Career Intelligence Medal awardee Christopher Burgess. By Christopher Burgess 25 Feb 2025 6 minsCSO and CISOGovernmentGovernment ITnews analysisUK monitoring group to classify cyber incidents on earthquake-like scaleThe Cyber Monitoring Centre (CMC) aims to establish a ‘consistent and objective framework’ to provide clarity to enterprise insurance buyers.By John Leyden 12 Feb 2025 5 minsData BreachIT Governance FrameworksIncident ResponseopinionWhy honeypots deserve a spot in your cybersecurity arsenalHoneypots are another tool in the toolbox for proactive cybersecurity leaders looking to get insight into what the bad guys are doing and help mitigate organizational risks.By Chris Hughes 05 Feb 2025 6 minsAdvanced Persistent ThreatsRisk ManagementSecurity Practicesfeature7 tips for improving cybersecurity ROIFrom scenario-based risk assessments to leveraging AI, security leaders share advice on squeezing more value out of your current cybersecurity investments.By John Edwards 04 Feb 2025 8 minsCSO and CISOIT StrategyROI and MetricsfeatureDownload the Agentic AI Enterprise SpotlightIn this issue, we explore the emerging field of agentic AI, which brings more autonomy to IT-managed systems — with both promise and peril.By CSO, InfoWorld, and CIO.com staff 02 Feb 2025 1 minGenerative AIIT StrategyRisk ManagementnewsWarning to FortiGate admins: You need to run a compromise assessment now This comes after stolen configuration data and passwords from a two-year old hack were leaked last week.By Howard Solomon 23 Jan 2025 5 minsCyberattacksData BreachRisk Managementfeature7 top cybersecurity projects for 2025A new year opens to both fresh and persistent cybersecurity challenges. These key projects should be at the top of your 2025 to-do list.By John Edwards 21 Jan 2025 8 minsCloud SecurityData and Information SecurityIT GovernancefeatureThe 7 most in-demand cybersecurity skills todayEvolving IT strategies and emerging technologies and threats have organizations shuffling their cyber skills want lists, according to a recent survey of IT security managers conducted by ISC2.By Eric Frank 12 Dec 2024 11 minsApplication SecurityCloud SecurityCompliancefeature11 biggest financial sector cybersecurity threatsBanks, investment, and insurance firms can expect ransomware, DDoS, compliance, and AI to be their top risks.By John Leyden 20 Nov 2024 11 minsPhishingRansomwareRegulationfeatureThe 10 biggest issues CISOs and cyber teams face todayFrom escalating cyber threats to questions about resources and security’s role in the enterprise, cyber leaders are reshaping their agendas to address several key long-standing and emerging concerns.By Mary K. Pratt 28 Oct 2024 10 minsCSO and CISOCyberattacksRegulationnews analysis77% of CISOs fear next big breach will get them firedIncreased pressures are putting CISOs in the hot seat, but should they bear all the blame when the inevitable comes?By Evan Schuman 28 Oct 2024 3 minsCSO and CISOData BreachIncident Responsefeature7 risk management mistakes CISOs still makeGiven its importance and complexity, risk management is a trap door for many CISOs. Here are seven ways to keep your enterprise from inadvertently falling into a security crisis.By John Edwards 22 Oct 2024 8 minsRisk ManagementSecurity Show more Show less View all Resources whitepaper Complimentary Forrester Report: The State Of Third-Party Risk Management, 2024 Competing in an age of Al and rapid innovation requires organizations to think globally, act quickly, and exponentially increase reliance on an ecosystem of third parties. The post Complimentary Forrester Report: The State Of Third-Party Risk Management, 2024 appeared first on Whitepaper Repository –. By Dataminr 01 Oct 2024Artificial IntelligenceRisk ManagementSecurity whitepaper Global Payments Reduces Third-party Risk With Dataminr By Dataminr 30 Sep 2024CyberattacksRisk ManagementSecurity whitepaper Third-party SMBs Open the Door to Enterprise Cyber Risk By Dataminr 30 Sep 2024Risk ManagementSecuritySmall and Medium Business View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsRisk ManagementSecuritySupply Chain Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsIT LeadershipRisk ManagementSecuritySee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos news Critical vulnerabilities expose network security risks in Keysight's infrastructure By Gyana Swain 05 Mar 20254 mins SecurityVulnerabilities feature The dirty dozen: 12 worst ransomware groups active today By John Leyden 05 Mar 202511 mins Ransomware news Chinese cyber espionage growing across all industry sectors By Lucian Constantin 05 Mar 20256 mins Advanced Persistent ThreatsCyberattacksThreat and Vulnerability Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain