Latest from todaynewsLinux, macOS users infected with malware posing as legitimate Go packagesThreat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.By Shweta Sharma07 Mar 20253 minsMalwareSecurity feature 8 obstacles women still face when seeking a leadership role in ITBy Christina Wood07 Mar 20258 minsCareersIT Leadershipfeature What is risk management? Quantifying and mitigating uncertaintyBy Josh Fruhlinger07 Mar 202510 minsIT Governance FrameworksIT LeadershipRisk Management news analysisChinese APT Silk Typhoon exploits IT supply chain weaknesses for initial accessBy Lucian Constantin 06 Mar 20256 minsAdvanced Persistent ThreatsGovernmentHacker Groups newsUS charges 12 Chinese hackers in major government-backed espionage campaignBy Gyana Swain 06 Mar 20255 minsCybercrimeSecurity newsBadbox Android botnet disrupted through coordinated threat huntingBy Shweta Sharma 06 Mar 20254 minsAndroid SecuritySecurity news analysis60% of cybersecurity pros looking to change employersBy John Leyden 06 Mar 20255 minsCareersIT Leadership opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 20258 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management newsRansomware goes postal: US healthcare firms receive fake extortion lettersBy John E. Dunn 05 Mar 20256 minsRansomwareSecurity ArticlesnewsCritical vulnerabilities expose network security risks in Keysight's infrastructureMultiple security flaws in network packet broker devices could lead to code execution and data compromise.By Gyana Swain 05 Mar 2025 4 minsSecurityVulnerabilitiesfeatureThe dirty dozen: 12 worst ransomware groups active todayRansomware is on the rise across all industries. Here are the criminal operations cybersecurity professionals must be aware of.By John Leyden 05 Mar 2025 11 minsRansomwarenewsChinese cyber espionage growing across all industry sectorsNew and expanding China-backed threat groups are pushing a broader cyber strategy, likely with eventual reunification with Taiwan in mind, CrowdStrike security researchers say.By Lucian Constantin 05 Mar 2025 6 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementopinionMicrosoft pushes a lot of products on users, but here’s one cybersecurity can embraceThe Entra ID P2 license is just one among many products and services that Microsoft is making mandatory for users, but its identity access management features make it a big overall security plus.By Susan Bradley 05 Mar 2025 6 minsAccess ControlData and Information SecurityWindows SecuritybrandpostSponsored by CyberNewsWireHunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC AutomationBy Cyber NewsWire – Paid Press Release 05 Mar 2025 5 minsCyberattacksSecuritynewsPolyglot files used to spread new backdoorProofpoint reports that a threat actor has used the tactic against critical infrastructure firms in the UAE, warns CISOs to watch for it elsewhere.By Howard Solomon 04 Mar 2025 5 minsMalwarePhishingnewsVMware ESXi gets critical patches for in-the-wild virtual machine escape attackBroadcom has patched three vulnerabilities in the VMware ESXi hypervisor and related products, with Microsoft reporting the flaws are being actively exploited to take control of host systems.By Lucian Constantin 04 Mar 2025 4 minsSecurityZero-Day VulnerabilitiesnewsMisconfigured access management systems expose global enterprises to security risksWidespread AMS vulnerabilities threaten physical and data security across key industries.By Gyana Swain 04 Mar 2025 4 minsAccess ControlIdentity and Access ManagementSecurityfeature7 key trends defining the cybersecurity market todayHere’s what CISOs should know about the industry’s evolutions, as top vendors fortify platform strategies, upstarts attract VC investment, and product categories blur and emerge.By Neal Weinberg 04 Mar 2025 9 minsIntrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture CapitalnewsManufacturers still poorly prepared for cyberattacks as IT/OT convergeA global survey shows that less than half of manufacturing companies are prepared for the rising onslaught of cyberattacks against them. By Julia Mutzbauer 04 Mar 2025 3 minsManufacturing IndustrySecuritybrandpostSponsored by CyberNewsWireBubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032By Cyber NewsWire – Paid Press Release 03 Mar 2025 4 minsCyberattacksSecuritynewsCISOs should address identity management 'as fast as they can’ says CrowdStrike execThreat actors increasingly using stolen credentials to compromise cloud assets, warns the company's annual threat report.By Howard Solomon 03 Mar 2025 5 minsCyberattacksSecurity Show more Show less View all Upcoming Events04/May-06/May in-person eventWork+ – The New Future of Work: AI, Emerging Tech & Where IT Can Lead04 May 2025Loews Vanderbilt Hotel Nashville EventsHuman Resources 15/May in-person event FutureIT Los Angeles15 May 2025The Biltmore Data and Information SecurityEvents 25/Jun in-person event FutureIT Dallas25 Jun 2025Union Station Application SecurityArtificial IntelligenceEvents View all events Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISOVideo on demand videoCSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumersMartin Whitworth – Lead Cyber Risk Expert at S&P Global Ratings – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about why the world’s largest credit rating firm is now factoring in cyber preparedness when assessing companies, how cyber risk affects a company’s financial health, and the role CISOs play in it. 12 Feb 2025 27 minsSecurity CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 2025 18 minsSecurity CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 2024 15 minsCritical InfrastructureIT GovernanceSupply Chain CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 2024 19 minsCritical InfrastructureSecuritySupply ChainSee all videos Explore a topic Show me moreLatestArticlesPodcastsVideos news US Cybercom, CISA retreat in fight against Russian cyber threats: reports By Cynthia Brumfield 03 Mar 20256 mins CyberattacksGovernment ITRansomware how-to Download the UEM vendor comparison chart, 2025 edition By Bob Violino and vpotter 03 Mar 20251 min Endpoint ProtectionEnterprise Buyer’s GuidesMobile Security feature Download the AI Risk Management Enterprise Spotlight By CSOonline.com and CIO.com staff 03 Mar 20251 min Risk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity video CSO Executive Sessions: DocDoc’s Rubaiyyaat Aakbar on security technology 12 Sep 202419 mins Artificial IntelligenceHealthcare IndustrySecurity