Latest from todayfeature8 obstacles women still face when seeking a leadership role in ITFor women, the IT career ladder is littered with obstacles, bias, and challenges that cannot always be overcome without the help of allies.By Christina Wood07 Mar 20258 minsCareersIT Leadership news analysis 60% of cybersecurity pros looking to change employersBy John Leyden06 Mar 20255 minsCareersIT Leadershipfeature The dirty dozen: 12 worst ransomware groups active todayBy John Leyden05 Mar 202511 minsRansomware featureWhat is risk management? Quantifying and mitigating uncertaintyBy Josh Fruhlinger 07 Mar 202510 minsIT Governance FrameworksIT LeadershipRisk Management featureWhy cyber attackers are targeting your solar energy systems — and how to stop themBy Michael Nadeau 03 Mar 202513 minsCritical InfrastructureSecurityUtilities Industry opinionMicrosoft pushes a lot of products on users, but here’s one cybersecurity can embraceBy Susan Bradley 05 Mar 20256 minsAccess ControlData and Information SecurityWindows Security news analysisChinese APT Silk Typhoon exploits IT supply chain weaknesses for initial accessBy Lucian Constantin 06 Mar 20256 minsAdvanced Persistent ThreatsGovernmentHacker Groups feature7 key trends defining the cybersecurity market todayBy Neal Weinberg 04 Mar 20259 minsIntrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture Capital news analysisRansomware access playbook: What Black Basta’s leaked logs revealBy Lucian Constantin 03 Mar 20256 minsRansomware More security newsnewsLinux, macOS users infected with malware posing as legitimate Go packagesThreat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.By Shweta Sharma 07 Mar 2025 3 minsMalwareSecuritynewsUS charges 12 Chinese hackers in major government-backed espionage campaignJustice Department unveils indictments against Silk Typhoon group members, seizes domains in escalating cybersecurity standoff.By Gyana Swain 06 Mar 2025 5 minsCybercrimeSecuritynewsBadbox Android botnet disrupted through coordinated threat huntingHuman Security, in collaboration with Google, Shadowserver and others, has sinkholed C2 operations affecting 500,000 infected machines.By Shweta Sharma 06 Mar 2025 4 minsAndroid SecuritySecuritynewsRansomware goes postal: US healthcare firms receive fake extortion lettersFraudsters reportedly demanded up to $350,000 to cover up a fictitious data breach — but how can CSOs tell fake attacks from real ones in cybercrime’s hall of mirrors?By John E. Dunn 05 Mar 2025 6 minsRansomwareSecuritynewsCritical vulnerabilities expose network security risks in Keysight's infrastructureMultiple security flaws in network packet broker devices could lead to code execution and data compromise.By Gyana Swain 05 Mar 2025 4 minsSecurityVulnerabilitiesnewsChinese cyber espionage growing across all industry sectorsNew and expanding China-backed threat groups are pushing a broader cyber strategy, likely with eventual reunification with Taiwan in mind, CrowdStrike security researchers say.By Lucian Constantin 05 Mar 2025 6 minsAdvanced Persistent ThreatsCyberattacksThreat and Vulnerability ManagementnewsPolyglot files used to spread new backdoorProofpoint reports that a threat actor has used the tactic against critical infrastructure firms in the UAE, warns CISOs to watch for it elsewhere.By Howard Solomon 04 Mar 2025 5 minsMalwarePhishingnewsVMware ESXi gets critical patches for in-the-wild virtual machine escape attackBroadcom has patched three vulnerabilities in the VMware ESXi hypervisor and related products, with Microsoft reporting the flaws are being actively exploited to take control of host systems.By Lucian Constantin 04 Mar 2025 4 minsSecurityZero-Day VulnerabilitiesnewsMisconfigured access management systems expose global enterprises to security risksWidespread AMS vulnerabilities threaten physical and data security across key industries.By Gyana Swain 04 Mar 2025 4 minsAccess ControlIdentity and Access ManagementSecuritynewsManufacturers still poorly prepared for cyberattacks as IT/OT convergeA global survey shows that less than half of manufacturing companies are prepared for the rising onslaught of cyberattacks against them. By Julia Mutzbauer 04 Mar 2025 3 minsManufacturing IndustrySecuritynewsCISOs should address identity management 'as fast as they can’ says CrowdStrike execThreat actors increasingly using stolen credentials to compromise cloud assets, warns the company's annual threat report.By Howard Solomon 03 Mar 2025 5 minsCyberattacksSecuritynewsUS Cybercom, CISA retreat in fight against Russian cyber threats: reportsPress reports suggest that US Cybercom is standing down from tracking Russia’s offensive cyber operations, and CISA may no longer consider Russia a priority. Officials say Cybercom’s action is a gambit to get Russia to negotiate, and CISA says the press reports are wrong.By Cynthia Brumfield 03 Mar 2025 6 minsCyberattacksGovernment ITRansomware Show more Show less Explore a topic Application Security Artificial Intelligence Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Enterprise Buyer’s Guides Generative AI Identity and Access Management IT Leadership Network Security Physical Security View all topics Spotlight: Managing Modern Risks Articles Buyer’s Guide Staying secure is of course critical, but there are many risks beyond security that enterprise IT must consider. We explore emerging risks that warrant your attention. View all Popular topicsIT Leadership opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 2025 8 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management opinionWhat CISOs need from the board: Mutual respect on expectationsBy David Gee 26 Feb 2025 6 minsBusiness IT AlignmentCSO and CISOCompliance featureHow to create an effective incident response planBy Bob Violino 25 Feb 2025 11 minsIT LeadershipIncident ResponseSecurity View topic Generative AI newsMicrosoft files lawsuit against LLMjacking gang that bypassed AI safeguardsBy Lucian Constantin 28 Feb 2025 4 minsCybercrimeGenerative AIThreat and Vulnerability Management feature5 things to know about ransomware threats in 2025By Rosalyn Page 27 Feb 2025 9 minsData and Information SecurityGenerative AIRansomware newsAI can kill banks: Cybersecurity’s disinformation gapBy Florian Maier 24 Feb 2025 2 minsFinancial Services IndustryGenerative AISecurity View topic Careers featureThe CSO guide to top security conferencesBy CSO Staff 28 Feb 2025 10 minsApplication SecurityEventsTechnology Industry featureBeyond the paycheck: What cybersecurity professionals really wantBy Aimee Chanthadavong 12 Feb 2025 9 minsCSO and CISOCareersIT Training featureCISOs embrace rise in prominence — with broader business authorityBy Esther Shein 13 Jan 2025 11 minsBusiness IT AlignmentCSO and CISOIT Strategy View topic Upcoming Events04/May-06/May in-person eventWork+ – The New Future of Work: AI, Emerging Tech & Where IT Can Lead04 May 2025Loews Vanderbilt Hotel Nashville EventsHuman Resources 15/May in-person event FutureIT Los Angeles15 May 2025The Biltmore Data and Information SecurityEvents 25/Jun in-person event FutureIT Dallas25 Jun 2025Union Station Application SecurityArtificial IntelligenceEvents View all events Hear from the Experts FeatureChief risk storyteller: How CISOs are developing yet another skillCybersecurity risks are critical to communicate, but CISOs are finding crafting a narrative that resonates requires more than technical expertise.By Rosalyn Page07 Oct 20249 mins CSO and CISOIT LeadershipRisk Management Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by CyberNewsWire Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation By Cyber NewsWire – Paid Press Release 05 Mar 20255 mins CyberattacksSecurity brandpost Sponsored by CyberNewsWire Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032 By Cyber NewsWire – Paid Press Release 03 Mar 20254 mins CyberattacksSecurity feature Download the AI Risk Management Enterprise Spotlight By CSOonline.com and CIO.com staff 03 Mar 20251 min Risk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain