featureHow to ensure cybersecurity strategies align with the company’s risk toleranceOne of the tenets of risk tolerance is considering the fallout of something going wrong. The risk may originate as a technical one, but for CISOs the challenge is deciphering the organization’s tolerance for the impact.By Rosalyn Page03 Sep 202410 minsCSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-dayBy Shweta Sharma02 Sep 20243 minsZero-day vulnerabilityfeature Ransomware recovery: 8 steps to successfully restore from backupBy Maria Korolov02 Sep 202417 minsRansomwareMalwareBackup and Recovery featureWomen in Cyber Day finds those it celebrates ‘leaving in droves’By Howard Solomon 30 Aug 20248 minsCareersIT Leadership newsLLMs fueling a “genAI criminal revolution” according to Netcraft reportBy Lynn Greiner 30 Aug 20245 minsPhishingHackingGenerative AI newsRansomware feared in the cyberattack on US oil services giantBy Shweta Sharma 30 Aug 20243 minsRansomware feature15 infamous malware attacks: The first and the worstBy Josh Fruhlinger and John Leyden 30 Aug 202416 minsRansomwareCyberattacksMalware featureThe CSO guide to top security conferencesBy CSO Staff 30 Aug 20248 minsTechnology IndustryIT SkillsEvents newsFortinet expands security lineup with sovereign SASEBy Sean Michael Kerner 29 Aug 20241 minNetwork Security CSO Executive Sessions videoCSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safeBryan Woodworth – Director of Solution Strategy at Aviatrix – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about safeguarding the Olympics from cyber threats, operational technology and IoT considerations for critical infrastructure, and more. 07 Aug 2024 17 minsRansomwareZero TrustCloud Security CSO Executive Sessions: Data protection in Malaysia 02 Jul 2024 15 minsCSO and CISO CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 2024 17 minsCSO and CISO CSO Executive Sessions: The personality of cybersecurity leaders 29 Apr 2024 19 minsCSO and CISO See all videos More security newsnewsF5, Intel team up to boost AI delivery, security F5 and Intel are working together to combine security and traffic-management capabilities from F5’s NGINX Plus suite with Intel’s OpenVINO open-source toolkit for optimizing AI inference and Intel IPU hardware accelerators.By Michael Cooney 29 Aug 2024 1 minNetwork SecurityArtificial IntelligenceSecuritynewsIranian threat actors targeting businesses and governments, CISA, Microsoft warnPioneer Kitten and Peach Sandstorm both believed to be state sponsored.By Howard Solomon 29 Aug 2024 7 minsRansomwareCyberattacksMalwarenewsGoogle ups bug bounties for ‘high quality’ Chrome huntersSecurity researchers can now earn a quarter million dollars reporting high-impact memory corruption vulnerabilities in Chrome.By CSO Staff and Mikael Markander 29 Aug 2024 3 minsVulnerabilitiesnewsTelegram CEO allowed platform to be abused by criminals, French prosecutors allegeThe messaging app’s founder, Pavel Durov, posted bail of $5.5 million before being ordered to stay in France and report to a police station twice a week.By John E. Dunn 29 Aug 2024 5 minsMessaging SecurityEncryptionnewsThe US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributorThe State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest.By Shweta Sharma 29 Aug 2024 3 minsHackingCybercrimenews analysisBlackByte ransomware gang exploits more orgs than previously knownThe suspected Conti offshoot group’s latest attacks display new tactics and a new file encryptor variant — and have included quick use of the recent VMware ESXi authentication bypass flaw.By Lucian Constantin 28 Aug 2024 6 minsRansomwarenewsTool used by ransomware groups now seen killing EDR: ReportThe Poortry/BurntCigar toolkit has added more ways for it to evade detection, evolved into something akin to a rootkit.By Howard Solomon 28 Aug 2024 4 minsRansomwareMalwarenewsCisco snaps up AI security player Robust IntelligencePlans call for integrating Robust Intelligence's AI security platform with Cisco Security Cloud to streamline threat protection for AI applications and models and increase visibility into AI traffic.By Ann Bednarz 28 Aug 2024 1 minMergers and AcquisitionsArtificial IntelligenceSecuritynewsCritical plugin flaw opens over a million WordPress sites to RCE attacksThe multilingual plugin is hit with a critical bug that can allow complete site compromise through remote code execution.By Shweta Sharma 28 Aug 2024 3 minsVulnerabilitiesnewsChina’s Volt Typhoon exploits Versa zero-day to hack US ISPs and IT firmsThe Chinese APT group leveraged the vulnerability to deploy a web shell that stole credentials from Versa Director SD-WAN deployments of ISPs, MSPs, and IT companies.By Lucian Constantin 27 Aug 2024 5 minsAdvanced Persistent ThreatsTechnology IndustryCyberattacksnewsTelegram founder’s arrest raises anxiety about future of end-to-end encryption If CEOs are held accountable for what happens on their platform, could this principle be applied to apps using end-to-end encryption where oversight is impossible? By John E. Dunn 27 Aug 2024 6 minsMessaging SecurityEncryptionnewsGoogle says a critical Chrome bug was exploited after a patch was releasedThe vulnerability that was fixed in an update released last week has found fresh exploitations in the wild.By Shweta Sharma 27 Aug 2024 3 minsBrowser SecurityZero-day vulnerability Show more Show less Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Popular topicsCybercrime newsRansomware attack paralyzes milking robots — cow deadBy Martin Bayer 07 Aug 2024 2 minsRansomwareAgriculture IndustryCybercrime news analysisNorth Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike reportBy Cynthia Brumfield 06 Aug 2024 8 minsCyberattacksThreat and Vulnerability ManagementCybercrime newsWho are the two Russian convicts released in the US-Russia prisoner swap?By Shweta Sharma 02 Aug 2024 3 minsCybercrime View topic Careers featureWhat savvy hiring execs look for in a CISO todayBy Evan Schuman 16 Jul 2024 10 minsCSO and CISOCareersIT Leadership featureMore than a CISO: the rise of the dual-titled IT leaderBy Rosalyn Page 10 Jul 2024 8 minsCSO and CISOCareersIT Leadership featureCRISC certification: Exam, requirements, training, potential salaryBy Josh Fruhlinger 09 Jul 2024 8 minsCertificationsIT SkillsIT Training View topic IT Leadership featureHow not to hire a North Korean IT spyBy John Leyden 28 Aug 2024 11 minsIT Leadership featureMain Line Health deploys chaos engineering to bolster healthcare resilienceBy Bob Violino 23 Aug 2024 7 minsCSO50Healthcare IndustryIncident Response opinionCybersecurity should return to reality and ditch the hypeBy Tyler Farrar 14 Aug 2024 6 minsCSO and CISOSecurity PracticesIT Leadership View topic Upcoming Events14/Nov awardsCSO30 Awards ASEAN14 Nov 2024Singapore CSO and CISO View all events In depth featureWho owns your data? SaaS contract security, privacy red flagsCompanies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.By Andrada Fiscutean27 Mar 202410 mins Data and Information Security Show me moreLatestArticlesPodcastsVideos opinion 5 best practices for running a successful threat-informed defense in cybersecurity By Jon Oltsik 29 Aug 20246 mins CSO and CISOThreat and Vulnerability ManagementEndpoint Protection feature What is OWASP? A standard bearer for better web application security By Linda Rosencrance 28 Aug 20248 mins Internet SecurityIT SkillsApplication Security brandpost Sponsored by Proofpoint The Role of AI in Email Security: Beyond Phishing Detection By Joan Goodchild 27 Aug 20244 mins Email Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO