featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff30 Aug 20248 minsTechnology IndustryIT SkillsEvents news F5, Intel team up to boost AI delivery, security By Michael Cooney29 Aug 20241 minNetwork SecurityArtificial IntelligenceSecuritynews Cisco snaps up AI security player Robust IntelligenceBy Ann Bednarz28 Aug 20241 minMergers and AcquisitionsArtificial IntelligenceSecurity featureWhat is OWASP? A standard bearer for better web application securityBy Linda Rosencrance 28 Aug 20248 minsInternet SecurityIT SkillsApplication Security feature10 top anti-phishing tools and servicesBy Tim Ferrill 27 Aug 202411 minsPhishingCyberattacksMalware featureHow MFA gets hacked — and strategies to prevent itBy David Strom 22 Aug 20248 minsMulti-factor AuthenticationAuthenticationSecurity brandpostSponsored by MicrosoftMicrosoft and NVIDIA: Partnering to protect AI workloads in AzureBy Beth Stackpole 12 Aug 20244 minsSecurity feature6 IT risk assessment frameworks comparedBy Bob Violino 09 Aug 20249 minsData and Information SecurityROI and MetricsRisk Management newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management ArticlesfeatureEU’s DORA regulation explained: New risk management requirements for financial firmsThe proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU.By Dan Swinhoe 08 Aug 2024 7 minsComplianceRisk ManagementSecurityfeature6 hot cybersecurity trends — and 2 going coldArtificial intelligence is altering not only the threat landscape but also how security teams can defend their organizations. But AI isn’t the only trend cybersecurity pros should be on top of.By Neal Weinberg 06 Aug 2024 11 minsPasswordsRansomwarePhishingnews analysisWill the public nature of ransom payments change CISO strategy over whether to pay?Reports identifying a $75 million ransom payment made in March by a Fortune 50 company raise some questions.By Evan Schuman 01 Aug 2024 4 minsCSO and CISORansomwareSecuritynewsDashlane study reveals massive spike in passkey adoptionOne in five users has at least one passkey stored, but a security consultant issues a reality check, saying in a sense ‘they are still passwords.’ By Paul Barker 31 Jul 2024 5 minsIdentity and Access ManagementSecurityfeature7 top cloud security threats — and how to address themDark and threatening, an insecure cloud should never be ignored. Here’s a rundown of the top threats you need to look out for.By John Edwards 31 Jul 2024 8 minsCloud SecurityCloud ComputingSecuritybrandpostSponsored by Cyber NewsWireAdaptive Shield Showcases New ITDR Platform for SaaS at Black Hat USAAmid rising breaches including Snowflake, the platform helps security teams proactively detect and respond to identity-centric threats in business-critical SaaS applicationsBy Cyber NewsWire – Paid Press Release 31 Jul 2024 4 minsCyberattacksSecurityfeatureDNSSEC explained: Why you might want to implement it on your domainThe Domain Name System Security Extensions provides cryptographic authentication to prevent redirection to rogue websites, but owners of many domains have yet to adopt it.By Lucian Constantin 26 Jul 2024 13 minsEncryptionInternet SecuritySecuritynewsCrowdStrike blames it testing shortcomings for Windows meltdownCustomers will be given more control over when and where content is downloaded to reduce the risk of similar incidents in future.By John Leyden 24 Jul 2024 5 minsIncident ResponseEndpoint ProtectionSecuritybrandpostSponsored by FortinetKey considerations for adopting a platform approach to cybersecurityEnterprises must choose a consolidated, platform-centric approach to effectively protect their digital assets. But how?By Nirav Shah 22 Jul 2024 5 minsSecuritynewsCrowdStrike CEO apologizes for crashing IT systems around the world, details fixAttempts to mitigate a novel Windows threat caused systems running CrowdStrike’s Falcon sensor to crash.By Peter Sayer 20 Jul 2024 4 minsSecuritynewsBlue screen of death strikes crowd of CrowdStrike serversA bad software update from security software vendor CrowdStrike has paralyzed Windows machines around the world.By Peter Sayer 19 Jul 2024 4 minsBugsSecurityfeatureHashcat explained: How this password cracker worksBeyond its criminal uses, hashcat is a must-have tool for penetration testers, sysadmins, and researchers to test system security, check password strength, and validate the strength of cryptographic algorithms.By J.M. Porup 19 Jul 2024 7 minsPasswordsNetwork SecuritySecurity Show more Show less View all Resources whitepaper Cyber resilience in the ransomware era Natural disasters are a huge threat to business operations. But at least they tend to strike and move on. Cybercriminals are different. They never stop working—and they’re always using new tools to hold your data hostage and take your business down. The post Cyber resilience in the ransomware era appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats 05 Nov 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development 30 Oct 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now 22 Oct 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO