featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff30 Aug 20248 minsTechnology IndustryIT SkillsEvents feature What is OWASP? A standard bearer for better web application securityBy Linda Rosencrance28 Aug 20248 minsInternet SecurityIT SkillsApplication Securityopinion Bug bounty programs take root in Russia — with possible far-reaching implicationsBy Sarah Wiedemar27 Aug 20247 minsTechnology IndustryApplication Security newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management feature6 hot cybersecurity trends — and 2 going coldBy Neal Weinberg 06 Aug 202411 minsPasswordsRansomwarePhishing featureNHIs may be your biggest — and most neglected — security holeBy Evan Schuman 23 Jul 20249 minsApplication SecurityIdentity and Access ManagementNetwork Security news analysisPython GitHub token leak shows binary files can burn developers tooBy Lucian Constantin 11 Jul 20245 minsDevSecOpsApplication SecuritySoftware Development featureWhitelisting explained: How it works and where it fits in a security programBy Josh Fruhlinger and CSO Staff 07 Jun 202410 minsEmail SecurityApplication SecurityData and Information Security newsOver half of government applications have unpatched flaws older than a yearBy Lucian Constantin 30 May 20246 minsGovernment ITApplication SecurityVulnerabilities ArticlesnewsCycode rolls out ASPM connector marketplace, analysts see it as bare minimumApplication security posture management tools need to integrate with other security tools to do their job. By Evan Schuman 16 May 2024 4 minsApplication SecuritynewsEquipped with AI tools, hackers make apps riskier than everThe odds of attacks are growing as attackers can now easily access code modification and reverse engineering tools.By Shweta Sharma 14 May 2024 4 minsApplication SecuritynewsGoogle, Meta, Spotify accused of flouting Apple’s device fingerprinting rulesSecurity researchers allege that several apps are collecting data from iOS devices, violating Apple’s policy on device fingerprinting.By Gyana Swain 08 May 2024 7 minsMobile SecurityApplication Securitynews analysisKinsing crypto mining campaign targets 75 cloud-native applicationsFive years after being discovered, the Kinsing cryptojacking operation remains very active against organizations, employing daily probes for vulnerable applications using an ever-growing list of exploits.By Lucian Constantin 08 May 2024 6 minsCryptocurrencyMalwareApplication SecuritynewsSAP users are at high risk as hackers exploit application vulnerabilitiesResearch highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations.By Shweta Sharma 17 Apr 2024 4 minsApplication SecurityVulnerabilitiesfeatureWhere in the world is your AI? Identify and secure AI across a hybrid environmentAs AI becomes integral to systems brought into the enterprise ecosystem it is increasingly critical for security teams to know where it is and reduce its risks. By Deb Radcliff 17 Apr 2024 9 minsApplication SecurityCloud SecurityNetwork SecurityfeatureWhat is identity fabric immunity? Abstracting identity for better securityCISOs struggling to manage a diverse and complex identity access management infrastructure should start thinking about identity fabric immunity.By Matthew Tyson 03 Apr 2024 11 minsCSO and CISOApplication SecurityIdentity and Access Managementnews analysisSoftware supply chain attack impacts repo of large Discord bot communityThe incident shows the snowball effect a single malicious package can have on the open-source development ecosystem.By Lucian Constantin 27 Mar 2024 6 minsDevSecOpsMalwareSupply ChainfeatureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareSome of today’s most popular and useful information-sharing platforms can leave a lot to be desired from a security standpoint. Here are some of the issues and how to mitigate them.By Susan Bradley 19 Mar 2024 7 minsWindows SecurityApplication SecurityCloud Securitynews analysisNew Kubernetes vulnerability allows privilege escalation in WindowsAttackers can abuse YAML configuration files to execute malicious commands in Windows hosts.By Lucian Constantin 13 Mar 2024 6 minsDevSecOpsApplication SecurityVulnerabilitiesnewsTool sprawl is hurting application security, US CSOs saySecurity teams are managing many independent security tools and are able to fully review only half of major code changes, a new survey has found.By Shweta Sharma 13 Feb 2024 5 minsApplication SecurityfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom 13 Feb 2024 8 minsDevSecOpsApplication SecurityIdentity and Access Management Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper The Evolving Role of the Australian Cyber Security Centre in Safeguarding Australians from Cyber Threats By LastPass 23 Aug 2024CyberattacksCybercrimeSecurity whitepaper Global Data Insights Survey: Empowering the Data and AI-Ready Enterprise By Digital Realty Trust, L.P. 16 Aug 2024Artificial IntelligenceBusiness OperationsData and Information Security View all Podcasts podcastsCSO Executive Sessions / AustraliaIn this weekly series, host Edmund Kennedy, Editor of CSO Australia, interviews top chief information security officers throughout Australia to discuss current security threats, critical IT projects, security skills and careers, and much more.19 episodesApplication Security Ep. 19 CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO Ep. 18 CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO Video on demand videoCSO Executive Sessions Australia with Gavin Ryan, Global Head of Information Security, NavitasCSO Executive Sessions Australia with Gavin Ryan, Global Head of Information Security, Navitas, on the dynamics of overseeing a cyber security strategy for a global business, why it’s felt organisations will go on a ‘data diet’ in 2023, and the importance of raising awareness of good cyber security principles among our youngest Australians. 26 May 2023 12 minsApplication Security CSO Executive Sessions with Kevin Tham, CISO at eitka 03 May 2023 19 minsApplication Security CSO Executive Sessions Australia with Charles Gillman, CISO at SuperChoice 27 Apr 2023 18 minsApplication Security What’s ahead for cybersecurity in 2019: TECH(talk) 01 Feb 2019 25 minsRansomwareTechnology IndustryCyberattacks See all videos Explore a topic Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO