featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff30 Aug 20248 minsTechnology IndustryIT SkillsEvents feature What is OWASP? A standard bearer for better web application securityBy Linda Rosencrance28 Aug 20248 minsInternet SecurityIT SkillsApplication Securityopinion Bug bounty programs take root in Russia — with possible far-reaching implicationsBy Sarah Wiedemar27 Aug 20247 minsTechnology IndustryApplication Security newsBlack Hat: Latest news and insightsBy CSO Staff 08 Aug 20244 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability Management feature6 hot cybersecurity trends — and 2 going coldBy Neal Weinberg 06 Aug 202411 minsPasswordsRansomwarePhishing featureNHIs may be your biggest — and most neglected — security holeBy Evan Schuman 23 Jul 20249 minsApplication SecurityIdentity and Access ManagementNetwork Security news analysisPython GitHub token leak shows binary files can burn developers tooBy Lucian Constantin 11 Jul 20245 minsDevSecOpsApplication SecuritySoftware Development featureWhitelisting explained: How it works and where it fits in a security programBy Josh Fruhlinger and CSO Staff 07 Jun 202410 minsEmail SecurityApplication SecurityData and Information Security newsOver half of government applications have unpatched flaws older than a yearBy Lucian Constantin 30 May 20246 minsGovernment ITApplication SecurityVulnerabilities ArticlesnewsCycode rolls out ASPM connector marketplace, analysts see it as bare minimumApplication security posture management tools need to integrate with other security tools to do their job. By Evan Schuman 16 May 2024 4 minsApplication SecuritynewsEquipped with AI tools, hackers make apps riskier than everThe odds of attacks are growing as attackers can now easily access code modification and reverse engineering tools.By Shweta Sharma 14 May 2024 4 minsApplication SecuritynewsGoogle, Meta, Spotify accused of flouting Apple’s device fingerprinting rulesSecurity researchers allege that several apps are collecting data from iOS devices, violating Apple’s policy on device fingerprinting.By Gyana Swain 08 May 2024 7 minsMobile SecurityApplication Securitynews analysisKinsing crypto mining campaign targets 75 cloud-native applicationsFive years after being discovered, the Kinsing cryptojacking operation remains very active against organizations, employing daily probes for vulnerable applications using an ever-growing list of exploits.By Lucian Constantin 08 May 2024 6 minsCryptocurrencyMalwareApplication SecuritynewsSAP users are at high risk as hackers exploit application vulnerabilitiesResearch highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations.By Shweta Sharma 17 Apr 2024 4 minsApplication SecurityVulnerabilitiesfeatureWhere in the world is your AI? Identify and secure AI across a hybrid environmentAs AI becomes integral to systems brought into the enterprise ecosystem it is increasingly critical for security teams to know where it is and reduce its risks. By Deb Radcliff 17 Apr 2024 9 minsApplication SecurityCloud SecurityNetwork SecurityfeatureWhat is identity fabric immunity? Abstracting identity for better securityCISOs struggling to manage a diverse and complex identity access management infrastructure should start thinking about identity fabric immunity.By Matthew Tyson 03 Apr 2024 11 minsCSO and CISOApplication SecurityIdentity and Access Managementnews analysisSoftware supply chain attack impacts repo of large Discord bot communityThe incident shows the snowball effect a single malicious package can have on the open-source development ecosystem.By Lucian Constantin 27 Mar 2024 6 minsDevSecOpsMalwareSupply ChainfeatureTeams, Slack, and GitHub, oh my! – How collaborative tools can create a security nightmareSome of today’s most popular and useful information-sharing platforms can leave a lot to be desired from a security standpoint. Here are some of the issues and how to mitigate them.By Susan Bradley 19 Mar 2024 7 minsWindows SecurityApplication SecurityCloud Securitynews analysisNew Kubernetes vulnerability allows privilege escalation in WindowsAttackers can abuse YAML configuration files to execute malicious commands in Windows hosts.By Lucian Constantin 13 Mar 2024 6 minsDevSecOpsApplication SecurityVulnerabilitiesnewsTool sprawl is hurting application security, US CSOs saySecurity teams are managing many independent security tools and are able to fully review only half of major code changes, a new survey has found.By Shweta Sharma 13 Feb 2024 5 minsApplication SecurityfeatureHow to strengthen your Kubernetes defensesKubernetes-focused attacks are on the rise. Here is an overview of the current threats and best practices for securing your clusters.By David Strom 13 Feb 2024 8 minsDevSecOpsApplication SecurityIdentity and Access Management Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Podcasts podcastsCSO Executive Sessions / ASEANIn this weekly series, host Xiou Ann Lim, Editor for CSO ASEAN at Foundry, interviews top chief information security officers throughout the ASEAN region to discuss current security threats, critical IT projects, security skills and careers, and much more.62 episodesApplication Security Ep. 62 CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO Ep. 62 CSO Executive Sessions: Data protection in Malaysia 02 Jul 202415 mins CSO and CISO Video on demand videoCSO Executive Sessions with Mohammad Firdaus Juhari, Head of Digital Security, edotco GroupMohammad Firdaus Juhari, Head of Digital Security at edotco Group, joins host Xiou Ann Lim, Editor for CSO ASEAN, for this CSO Executive Sessions interview. 23 May 2023 18 minsApplication Security What’s ahead for cybersecurity in 2019: TECH(talk) 01 Feb 2019 25 minsRansomwareTechnology IndustryCyberattacks 6 security reasons to upgrade to Windows 10 25 Jul 2018 1 minsApplication SecurityPrivacyWindows Don’t ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecurityVulnerabilitiesSecurity See all videos Explore a topic Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO