featureHow to ensure cybersecurity strategies align with the company’s risk toleranceOne of the tenets of risk tolerance is considering the fallout of something going wrong. The risk may originate as a technical one, but for CISOs the challenge is deciphering the organization’s tolerance for the impact.By Rosalyn Page03 Sep 202410 minsCSO and CISORisk Management how-to 3 key strategies for mitigating non-human identity risksBy Chris Hughes22 Aug 20246 minsData and Information SecurityIdentity and Access ManagementRisk Managementnews MIT delivers database containing 700+ risks associated with AI By Paul Barker15 Aug 20246 minsRisk Management feature6 IT risk assessment frameworks comparedBy Bob Violino 09 Aug 20249 minsData and Information SecurityROI and MetricsRisk Management featureEU's DORA regulation explained: New risk management requirements for financial firmsBy Dan Swinhoe 08 Aug 20247 minsComplianceRisk ManagementSecurity opinionHow cyber insurance shapes risk: Ascension and the limits of lessons learned By Christopher Whyte 07 Aug 202410 minsInsurance IndustryRansomwareHealthcare Industry feature3 reasons users can’t stop making security mistakes — unless you address themBy Ariella Brown 31 May 20245 minsData BreachRisk Management opinionEmployee discontent: Insider threat No. 1By Christopher Burgess 21 May 20248 minsCSO and CISOThreat and Vulnerability ManagementHuman Resources featureAre you a toxic cybersecurity boss? How to be a better CISOBy Christine Wong 18 Apr 20249 minsCSO and CISOHuman ResourcesRisk Management ArticlesfeatureTop 6 bad cybersecurity habits of SMBs Smaller businesses are in the crosshairs of cyber criminals and with attacks on the rise, now is not the time for misplaced confidence in your defenses. Experts tell CSO the bad habits making SMBs easy targets.By Rosalyn Page 15 Apr 2024 10 minsSmall and Medium BusinessData and Information SecurityRisk ManagementnewsSecurity concerns could be holding back AI projectsWhile considering AI adoption, most organizations are concerned about data privacy, integrity, and security. By Shweta Sharma 03 Apr 2024 4 minsRisk Managementhow-toDSPM buyer’s guide: Top 12 data security posture management toolsDSPM tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data lossBy David Strom 02 Apr 2024 14 minsData and Information SecurityRisk ManagementEnterprise Buyer’s GuidesopinionRisky business: 6 steps to assessing cyber risk for the enterpriseRisk is an unavoidable consequence of doing business in the digital age. These six steps for creating a risk assessment plan can help anticipate the danger.By Steve Durbin 27 Mar 2024 6 minsBusinessBusiness IT AlignmentRisk ManagementnewsOrca to offer armor against AI adoption risksThe company's new AI-security posture management (AI-SPM) offering is designed to secure an organization’s AI projects from sensitive access risks.By Shweta Sharma 19 Mar 2024 4 minsRisk ManagementSecurity Softwarefeature4 tabletop exercises every security team should runEvery organization should run tabletop exercises that answer key questions about their preparedness for ransomware and DDoS attacks, third-party risks, and insider threats. By Stephen Lawton 06 Mar 2024 10 minsDDoSRansomwareSupply ChainfeatureWhy governance, risk, and compliance must be integrated with cybersecurityWith pressure from regulators, evolving threats and the need for stronger oversight, integrating cybersecurity risks into GRC programs requires alignment between both areas.By Rosalyn Page 29 Feb 2024 10 minsComplianceRisk ManagementopinionA changing world requires CISOs to rethink cyber preparednessCISOs should consider a more values-oriented, socially informed approach to cyber risk as global conflict grows and many governments could change in key elections.By Christopher Whyte 13 Feb 2024 12 minsCSO and CISOCritical InfrastructureRisk Managementfeature6 best practices for third-party risk managementWith the proliferation of external products such as cloud storage, software as a service, and AI-driven security platforms, managing the risk inherent in using third-party providers has never been more important.By Mary K. Pratt 07 Feb 2024 11 minsThreat and Vulnerability ManagementBusiness IT AlignmentData and Information SecuritynewsNew Israeli startup to help organizations deal with GenAI-related risksThe SaaS offering is specifically targeted at providing organizations visibility and protection over third-party and homegrown generative AI tools.By Shweta Sharma 31 Jan 2024 4 minsRisk Managementnews analysisTime running out to patch Jenkins CI/CD server vulnerabilityThreat actors are already scanning the internet for vulnerable Jenkins servers after a proof of concept was published.By Lucian Constantin 30 Jan 2024 4 minsNetwork SecurityRisk ManagementVulnerabilitiesfeatureTop 4 LLM threats to the enterprisePrompt injection, prompt extraction, new phishing schemes, and poisoned models are the most likely risks organizations face when using large language models.By Deb Radcliff 22 Jan 2024 8 minsPhishingGenerative AIRisk Management Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsSupply ChainRisk ManagementSecurity Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsRisk ManagementIT LeadershipSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery feature Women in Cyber Day finds those it celebrates ‘leaving in droves’ By Howard Solomon 30 Aug 20248 mins CareersIT Leadership podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO