featureHow to ensure cybersecurity strategies align with the company’s risk toleranceOne of the tenets of risk tolerance is considering the fallout of something going wrong. The risk may originate as a technical one, but for CISOs the challenge is deciphering the organization’s tolerance for the impact.By Rosalyn Page03 Sep 202410 minsCSO and CISORisk Management how-to 3 key strategies for mitigating non-human identity risksBy Chris Hughes22 Aug 20246 minsData and Information SecurityIdentity and Access ManagementRisk Managementnews MIT delivers database containing 700+ risks associated with AI By Paul Barker15 Aug 20246 minsRisk Management feature6 IT risk assessment frameworks comparedBy Bob Violino 09 Aug 20249 minsData and Information SecurityROI and MetricsRisk Management featureEU's DORA regulation explained: New risk management requirements for financial firmsBy Dan Swinhoe 08 Aug 20247 minsComplianceRisk ManagementSecurity opinionHow cyber insurance shapes risk: Ascension and the limits of lessons learned By Christopher Whyte 07 Aug 202410 minsInsurance IndustryRansomwareHealthcare Industry featureCountdown to DORA: How CISOs can prepare for EU's newv Act By Andrada Fiscutean 24 Jul 202411 minsRegulationFinancial Services IndustryRisk Management opinionAT&T’s massive breach of metadata is a criminal treasure trove — as spy agencies knowBy Christopher Burgess 15 Jul 20248 minsData BreachData and Information SecurityRisk Management featureTop 10 open source software security risks — and how to mitigate themBy Chris Hughes 12 Jul 202411 minsOpen SourceRisk Management ArticlesfeatureCRISC certification: Exam, requirements, training, potential salaryTo what extent is ISACA’s Certified in Risk and Information Systems Control a gateway to high-level IT security leadership roles? Check out our CRISC certification guide to find out.By Josh Fruhlinger 09 Jul 2024 8 minsCertificationsIT SkillsIT Training feature10 most powerful cybersecurity companies todayWith AI and generative AI capabilities on the rise, a shift toward consolidation and platforms over point solutions is redefining the IT security market — as well as its leading vendors.By Neal Weinberg 02 Jul 2024 14 minsAccess ControlIdentity Management SolutionsMcAfeeopinionReduce security risk with 3 edge-securing stepsNot sure where you should start to approach risk reduction in your network? If you aren’t aware of any and all risks to your edge access, you’re not reducing risk. By Susan Bradley 01 Jul 2024 6 minsIdentity and Access ManagementRisk ManagementopinionContinuous red-teaming is your only AI risk defenseThe sheer volume of new and unknown threats coming our way — as well as the lack of fully formed risk frameworks for AI — means that red-team continuous monitoring is not only essential but perhaps your only path to security.By David Gee 26 Jun 2024 7 minsPenetration TestingData and Information SecurityRisk ManagementfeatureIs it time to split the CISO role?The scope of the CISOs’ role continues to grow with both technical and regulation aspects being part of daily tasks. Experts discuss whether it is time for the role of the CISO to be split into two.By Rosalyn Page 19 Jun 2024 9 minsCSO and CISORisk ManagementCareersnewsA new fear for CSOs: The sky is fallingResearchers look to space to give CSOs and CIOs a preview of possible cyber threats to come here on earth: Four million of them, all bad.By Lynn Greiner 17 Jun 2024 5 minsThreat and Vulnerability ManagementRisk ManagementVulnerabilitiesfeatureThe risks in mergers and acquisitions CISOs need to knowIgnoring cybersecurity in M&As can result in devastating breaches, financial loss, and operational disruptions. Learn about the tell-tale signs that could put business deals at risk. By Aimee Chanthadavong 11 Jun 2024 8 minsCyberattacksMergers and AcquisitionsRisk Managementfeature3 reasons users can’t stop making security mistakes — unless you address themUnderstanding what’s behind employee security mistakes can help CISOs make meaningful adjustments to their security awareness training strategies.By Ariella Brown 31 May 2024 5 minsData BreachRisk ManagementopinionEmployee discontent: Insider threat No. 1CISOs who focus only on detection technology — and don’t engage with the human side of the security equation — are missing a key ingredient for insider risk management.By Christopher Burgess 21 May 2024 8 minsCSO and CISOThreat and Vulnerability ManagementHuman ResourcesfeatureAre you a toxic cybersecurity boss? How to be a better CISOHorrible bosses are everywhere but cybersecurity appears to be particularly problematic, leading to talent-retention issues and security risks. Here’s how not to be a toxic CISO.By Christine Wong 18 Apr 2024 9 minsCSO and CISOHuman ResourcesRisk ManagementfeatureTop 6 bad cybersecurity habits of SMBs Smaller businesses are in the crosshairs of cyber criminals and with attacks on the rise, now is not the time for misplaced confidence in your defenses. Experts tell CSO the bad habits making SMBs easy targets.By Rosalyn Page 15 Apr 2024 10 minsSmall and Medium BusinessData and Information SecurityRisk ManagementnewsSecurity concerns could be holding back AI projectsWhile considering AI adoption, most organizations are concerned about data privacy, integrity, and security. By Shweta Sharma 03 Apr 2024 4 minsRisk Management Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management whitepaper 2023 GigaOm Radar Report on Autonomous Security Operation Center (SOC) Solutions [XSIAM] By Palo Alto Networks 11 Jul 2024Artificial IntelligenceSecuritySecurity Software whitepaper XSIAM E-Book: Machine-Led, Human-Empowered Platform By Palo Alto Networks 11 Jul 2024SecuritySecurity InfrastructureSecurity Operations Center View all Video on demand videoCSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safeBryan Woodworth – Director of Solution Strategy at Aviatrix – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about safeguarding the Olympics from cyber threats, operational technology and IoT considerations for critical infrastructure, and more. 07 Aug 2024 17 minsRansomwareZero TrustCloud Security What is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacks 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsSupply ChainRisk ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery feature Women in Cyber Day finds those it celebrates ‘leaving in droves’ By Howard Solomon 30 Aug 20248 mins CareersIT Leadership podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO