Latest from todaynews analysisUS military allocated about $30 billion to spend on cybersecurity in 2025The 2025 NDAA provides the US military with funding to rip Chinese gear out of telecom networks, protect mobile devices from foreign spyware, create an AI security center, and much more.By Cynthia Brumfield07 Jan 20258 minsGovernment ITMilitarySecurity Infrastructure how-to Download the Emerging Cybersecurity Issues Enterprise SpotlightBy CSO Staff01 Oct 20241 minCyberattacksSecurity InfrastructureSecurity Practicesfeature AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructureBy David Strom17 Sep 202410 minsEnterprise Buyer’s GuidesSecurity InfrastructureSecurity Practices newsOrganizations with outdated security approaches getting hammered: CloudflareBy Paul Barker 25 Jun 20244 minsAPIsInternet SecuritySecurity Infrastructure opinionBootstrapping: The best AI strategy is to avoid learning today’s AI techBy Christopher Whyte 17 Jun 202410 minsSecurity InfrastructureSecurity Practices featureTop 10 physical security considerations for CISOsBy Ericka Chickowski 23 Apr 202414 minsCritical InfrastructureSecuritySecurity Infrastructure featureWhat is identity fabric immunity? Abstracting identity for better securityBy Matthew Tyson 03 Apr 202411 minsApplication SecurityCSO and CISOIdentity and Access Management featureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareBy Susan Bradley 19 Mar 20247 minsApplication SecurityCloud SecurityWindows Security featureCyber Trust Mark concept gains momentum with smart device and IoT manufacturersBy Chris Hughes 06 Feb 20249 minsComplianceSecurity HardwareSecurity Infrastructure ArticlesnewsAI enters production systems even as ‘trust’ emerges as a growing concernAlmost four-fifths of the surveyed organizations had already adopted AI in their production, with only a few still testing the technology.By Shweta Sharma 14 Dec 2023 4 minsGenerative AISecurity InfrastructurenewsAI dominates cybersecurity megatrends for 2024: Report Three defining concerns associated with the security of AI include trust in AI, ethical application of AI, and cybersecurity of AI, according to the SIA research for cybersecurity megatrends in 2024.By Shweta Sharma 13 Dec 2023 4 minsGenerative AISecurity InfrastructurefeatureHow to maintain a solid cybersecurity posture during a natural disasterFire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst.By James Careless 30 Nov 2023 8 minsData and Information SecuritySecurity InfrastructureSecurity Operations CenternewsNetRise releases Trace solution with AI-powered semantic search aimed at protecting firmwareThe platform analyzes XIoT firmware using large language model capabilities to follow compromised or vulnerable assets back to their source.By Andrew Flynn 09 Nov 2023 3 minsInternet SecuritySecurity InfrastructureSecurity Monitoring SoftwarefeatureSecure from the get-go: top challenges in implementing shift-left cybersecurity approachesAn approach that builds cybersecurity into software and platforms can create stronger security, reducing vulnerabilities and risks. But implementation often comes with challenges. By Mary K. Pratt 07 Nov 2023 12 minsDevSecOpsDevopsSecurity InfrastructurenewsFIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely.By Michael Hill 27 Sep 2023 3 minsCertificationsInternet SecuritySecurity HardwarefeatureWhat’s a cyber incident response retainer and why do you need one?Whether you need to hire a team to respond to any and all cyberattacks or just some hired guns to boost your capabilities, incident response retainers can ensure you’re covered.By Linda Rosencrance 27 Sep 2023 8 minsCyberattacksIncident ResponseSecurity InfrastructureopinionViews of a hot cyberwar — the Ukrainian perspective on Russia’s online assaultA report from Ukraine’s cybersecurity service reveals insight into what the country has been facing from belligerent attackers and holds a lesson for CISOs.By Christopher Burgess 04 Apr 2023 5 minsData and Information SecuritySecurity InfrastructureSecurity PracticesopinionTransparency and policy shapes Cloudflare’s Kiwi Farms decisionsCloudflare's blocking of hate-based forum Kiwi Farms is the latest in a string of controversial actions and inactions around bad behaving customers. Agree or disagree, the company has stuck to its policy throughout.By Christopher Burgess 06 Sep 2022 5 minsSecuritySecurity Infrastructurenews analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentAbout 7,000 international workshop attendees heard discussion on NIST's plan to update its Cybersecurity Framework to incorporate more guidance on supply chain security, measurement, and implementation, among other topics.By Cynthia Brumfield 18 Aug 2022 8 minsIT Governance FrameworksSecurity InfrastructurenewsSnowflake offers cybersecurity data platform with security app integrationsSnowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for enhanced threat detection, investigation and alerts.By Shweta Sharma 09 Jun 2022 3 minsCloud ComputingData WarehousingSecurity Infrastructurefeature7 top challenges of security tool integrationWith organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.By Bob Violino 08 Feb 2022 6 minsNetwork SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain