Latest from todaynewsYour employees are using sensitive corporate devices for personal browsingStudy shows more than 97% of employees use the same devices for work and personal activities.By Shweta SharmaMar 28, 20244 minsMobile Security news Meta sued for snooping on Snapchat usersBy Sandeep BudkiMar 28, 20244 minsHackingLegalNetwork Securityopinion Are you okay? Understanding the world of a CISOBy Tyler FarrarMar 28, 20245 minsCSO and CISOCareers news analysisSoftware supply chain attack impacts repo of large Discord bot communityBy Lucian Constantin Mar 27, 20246 minsDevSecOpsMalwareSupply Chain newsTelesign launches integrated API to combine traditional identity verification channels By Shweta Sharma Mar 27, 20243 minsAuthenticationIdentity and Access ManagementSecurity Software featureWho owns your data? SaaS contract security, privacy red flags By Andrada Fiscutean Mar 27, 202410 minsData and Information Security opinionRisky business: 6 steps to assessing cyber risk for the enterpriseBy Steve Durbin Mar 27, 20246 minsBusinessBusiness IT AlignmentRisk Management news analysisNew Russian cyberespionage group APT29 campaign targets politiciansBy Lucian Constantin Mar 26, 20244 minsAdvanced Persistent ThreatsElection HackingPhishing newsThe US indicts 7 Chinese nationals for cyber espionageBy Sandeep Budki Mar 26, 20246 minsCyberattacksCybercrime Explore a topic Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security View all topics All topics Close Generative AI Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Popular topicsGenerative AI newsTop cybersecurity product news of the weekBy CSO staff Mar 22, 2024 67 minsGenerative AISecurity featureKeeping up with AI: OWASP LLM AI Cybersecurity and Governance ChecklistBy Chris Hughes Mar 14, 2024 10 minsGenerative AISecurity PracticesOpen Source newsMicrosoft reveals general availability of Copilot for SecurityBy Samira Sarraf Mar 13, 2024 4 minsGenerative AIThreat and Vulnerability Management View topic Cybercrime news analysisNew phishing campaign targets US organizations with NetSupport RATBy Lucian Constantin Mar 21, 2024 3 minsPhishingCyberattacksMalware news analysisNo easy solutions to the ransomware threat despite takedownsBy Cynthia Brumfield Mar 19, 2024 11 minsRansomwareCybercrime news analysisAttackers abuse cloud accounts to spawn thousands of crypto CDN nodesBy Lucian Constantin Mar 13, 2024 4 minsCryptocurrencyCyberattacksCloud Security View topic Careers featureWhy more women aren’t CISOs and how to change thatBy Rosalyn Page Mar 21, 2024 13 minsCSO and CISOCareersIT Leadership featureBeyond the table stakes: CISO Ian Schneller on cybersecurity’s evolving roleBy Michael Bertha Mar 07, 2024 9 minsCSO and CISOCareers featureThe CSO guide to top security conferencesBy CSO Staff Mar 01, 2024 20 minsTechnology IndustryIT SkillsEvents View topic IT Leadership featureWhen the boss doesn’t fit: Cybersecurity workforce more diverse than its managersBy Christine Wong Mar 26, 2024 10 minsCSO and CISOHuman ResourcesIT Leadership opinionThe cybersecurity skills shortage: A CISO perspectiveBy Jon Oltsik Mar 26, 2024 6 minsCSO and CISOIT SkillsIT Training feature5 certifications that can boost a cybersecurity leader’s careerBy Linda Rosencrance Mar 18, 2024 10 minsCSO and CISOCertificationsIT Training View topic Upcoming Events11/Apr virtual event Data, Analytics & AI SummitApr 11, 2024Virtual Summit Data and Information Security 14/May in-person event FutureIT Boston 2024: AI, Data, & Tech LeadershipMay 14, 2024Boston, MA IT Leadership 18/Jun in-person event FutureIT Chicago: Building the Digital Business with Cloud, AI and SecurityJun 18, 2024Chicago, IL Technology Industry View all events Hear from the Experts featureBatten down the hatches: it’s time to harden every facet of your Windows networkGone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan BradleyNov 22, 20237 mins PhishingWindows SecurityNetwork Security Read the Article Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote Work Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Fortinet Don’t let microbranch security be your network’s weak link By Nirav Shah Mar 27, 20245 mins Network Security brandpost Sponsored by Fortinet For the hybrid workforce, SASE-delivered zero trust is a must By Peter Newton Mar 27, 20245 mins Network Security brandpost Sponsored by Microsoft Security Want to build impact as a CISO? Choose CNAPP as your solution By Yuri Diogenes Mar 26, 20244 mins Security podcast CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama Mar 05, 202456 mins RansomwareArtificial Intelligence video CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO