Robuta

https://www.csoonline.com/ CSO Online | Security at the speed of business CSO delivers the critical information about trends, practices, and products enterprise security leaders need to defend against criminal cyberattacks and other... cso onlinesecurityspeedbusiness https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html Anthropic’s Mythos signals a structural cybersecurity shift | CSO Online Apr 13, 2026 - Claude Mythos Preview won’t break cybersecurity, but two new analyses shed light on how it is compressing exploit windows and exposing gaps in vulnerability... cso onlinemythossignalsstructuralcybersecurity https://www.csoonline.com/article/4162560/google-drafts-ai-agents-secure-systems-against-ai-hackers.html Google drafts AI agents to secure systems against AI hackers | CSO Online Apr 24, 2026 - At Cloud Next ‘26, Google introduced AI-driven security agents, Wiz-powered multicloud protection, and new controls to secure the growing AI attack surface. ai agentssecure systemscso onlinegoogledrafts https://www.csoonline.com/article/4124320/cisa-chief-uploaded-sensitive-government-files-to-public-chatgpt.html CISA chief uploaded sensitive government files to public ChatGPT | CSO Online Feb 5, 2026 - Madhu Gottumukkala uploaded multiple “for official use only” contracting documents to OpenAI’s public platform, bypassing DHS-approved AI tools and triggering... cso onlinecisachiefuploadedsensitive https://www.csoonline.com/article/4074590/critical-asp-net-core-vulnerability-earns-microsofts-highest-ever-severity-score.html Critical ASP.NET core vulnerability earns Microsoft’s highest-ever severity score | CSO Online Oct 17, 2025 - The Kestrel web server flaw allows request smuggling attacks, but the actual risk depends on the application code and deployment. cso onlinecriticalaspcorevulnerability https://www.csoonline.com/in/ Security at the speed of business – India | CSO Online CSO delivers the critical information about trends, practices, and products enterprise security leaders need to defend against criminal cyberattacks and other... cso onlinesecurityspeedbusinessindia https://www.csoonline.com/article/4120613/actively-exploited-cisco-uc-bug-requires-immediate-version%E2%80%91specific-patching.html Actively exploited Cisco UC bug requires immediate, version‑specific patching | CSO Online Jan 23, 2026 - The RCE flaw lets remote attackers gain root on affected systems with no user interaction. Cisco has released multiple version‑specific patch files — but... cso onlineactivelyexploitedciscouc https://www.csoonline.com/article/4162259/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox.html Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox | CSO Online Apr 22, 2026 - The AI exposed hundreds of bugs in Mozilla’s web browser, raising hopes around defensive advantage, alongside fears of dual-use risk. a new eraclaude mythoscso onlinesignalsai https://www.csoonline.com/article/4123250/shai-hulud-co-the-supply-chain-as-the-achilles-heel.html Shai-Hulud & Co.: The supply chain as Achilles' heel | CSO Online Feb 3, 2026 - Not only because of Shai-Hulud, but also due to AI, the threat situation in the software supply chain is coming to a head. Security must therefore be at the... supply chainachilles heelcso onlineshaico https://www.csoonline.com/article/4043721/russian-hackers-exploit-old-cisco-flaw-to-target-global-enterprise-networks.html Russian hackers exploit old Cisco flaw to target global enterprise networks | CSO Online Aug 22, 2025 - FBI and Cisco Talos warn of a sophisticated Russian FSB unit threatening enterprise network infrastructure and business continuity across critical sectors. global enterprisecso onlinerussianhackersexploit https://www.csoonline.com/article/518296/what-is-iam-identity-and-access-management-explained.html What is IAM? Identity and access management explained | CSO Online May 16, 2025 - IAM is a set of processes, policies, and tools for controlling user access to critical information within an organization. what isaccess managementcso onlineiamidentity https://www.csoonline.com/article/4159827/cisco-systems-issues-three-advisories-for-critical-vulnerabilities-in-webex-ise.html Cisco Webex SSO flaw needs manual certificate update to fix | CSO Online Apr 17, 2026 - The cloud-based Webex service has already been patched, but admins must replace an identity provider certificate in Webex Control Hub to complete the fix. cisco webexcso onlinessoneedsmanual https://www.csoonline.com/article/4024887/cisco-warns-of-another-critical-rce-flaw-in-ise-urges-immediate-patching.html Cisco warns of another critical RCE flaw in ISE, urges immediate patching | CSO Online Jul 22, 2025 - The newly disclosed flaw affects a specific API that suffers from insufficient input validation to allow unauthenticated RCE at the root. cso onlineciscowarnsanothercritical https://www.csoonline.com/article/1288955/the-12-best-cybersecurity-podcasts-as-recommended-by-the-professionals.html 12 best cybersecurity podcasts as recommended by the professionals | CSO Online Jan 22, 2025 - In the ever-evolving world of cybersecurity, it's important for CISOs and other security leaders to stay up to date – cybersecurity podcasts are a great way to... cso onlinebestcybersecuritypodcastsrecommended https://www.csoonline.com/blogs/ Blogs | CSO Online cso onlineblogs https://www.csoonline.com/article/4149411/ai-is-breaking-traditional-security-models-heres-where-they-fail-first.html AI is breaking traditional security models — Here’s where they fail first | CSO Online Mar 25, 2026 - What happens when AI turns operating assumptions into stress points? security modelscso onlineaibreakingtraditional https://www.csoonline.com/article/4074585/zero-disco-campaign-hits-legacy-cisco-switches-with-fileless-rootkit-payloads.html ‘Zero Disco’ campaign hits legacy Cisco switches with fileless rootkit payloads | CSO Online Oct 18, 2025 - Researchers warn of fileless payloads, memory hooks, and a UDP-based C2 controller that complicate detection and remediation. cso onlinecampaignhitslegacycisco https://www.csoonline.com/article/4154052/cisco-fixes-critical-imc-auth-bypass-present-in-many-products.html Cisco fixes critical IMC auth bypass present in many products | CSO Online Apr 3, 2026 - The Integrated Management Controller (IMC) flaw gives attackers admin access and remote control over servers even when main OS is shut down. cso onlineciscofixescriticalimc https://www.csoonline.com/article/4028412/supply-chain-attack-compromises-npm-packages-to-spread-backdoor-malware.html Supply chain attack compromises npm packages to spread backdoor malware | CSO Online Jul 24, 2025 - Phishing attacks on package maintainer accounts led to infected JavaScript type testing utilities. supply chain attackcso onlinenpmpackagesspread https://www.csoonline.com/article/4162178/microsoft-issues-out-of-band-patch-for-critical-security-flaw-in-update-to-asp-net-core.html Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET Core | CSO Online Apr 22, 2026 - Patching is not enough: applications embedding the insecure library will need to be rebuilt, and affected tokens and cookies expired. out ofcso onlinemicrosoftissuesband https://www.csoonline.com/article/4152696/attackers-trojanize-axios-http-library-in-highest-impact-npm-supply-chain-attack.html Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack | CSO Online Mar 31, 2026 - With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how quickly a compromised package can... supply chain attackcso onlineattackersaxioshttp https://www.csoonline.com/article/1293456/three-of-four-cisos-ready-for-job-change.html Three of four CISOs ready for job change | CSO Online May 5, 2025 - A new IANS/Artico report shows that the percentage of CISOs satisfied with their jobs dropped 10 points in last 12 months. job changecso onlinethreefourcisos https://www.csoonline.com/article/4110008/top-cyber-threats-to-your-ai-systems-and-infrastructure.html Top cyber threats to your AI systems and infrastructure | CSO Online Jan 8, 2026 - From data poisoning to prompt injection, threats against enterprise AI applications and foundations are beginning to move from theory to reality. cyber threatsai systemscso onlinetopinfrastructure https://www.csoonline.com/reviews/ Reviews | CSO Online cso onlinereviews https://www.csoonline.com/profile/bob-violino/ Bob Violino | CSO Online cso onlinebob https://www.csoonline.com/article/4161389/azure-sre-agent-flaw-let-outsiders-silently-eavesdrop-on-enterprise-cloud-operations.html Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operations | CSO Online Apr 21, 2026 - A multi-tenant authentication gap in Microsoft’s AI operations agent exposed live command streams, internal reasoning, and credentials to any Entra ID account,... sre agententerprise cloudcso onlineazurelets https://www.csoonline.com/article/1295002/report-world-governments-must-act-to-create-generative-ai-safeguards.html Report: World governments must act to create generative AI safeguards | CSO Online Apr 23, 2025 - Global regulatory efforts focused on generative AI have taken a wide range of approaches, but more guidance needed on permissible uses of the technology. generative aicso onlinereportworldgovernments https://www.csoonline.com/article/4040564/warning-patch-this-hole-in-cisco-secure-fmc-fast.html Warning: Patch this hole in Cisco Secure FMC fast | CSO Online Aug 18, 2025 - If RADIUS authentication is enabled, vulnerability could allow remote attacker access to security devices. cisco securecso onlinewarningpatchhole https://www.csoonline.com/article/4109488/attackers-bring-their-own-passwords-to-cisco-and-palo-alto-vpns.html Attackers bring their own passwords to Cisco and Palo Alto VPNs | CSO Online Dec 19, 2025 - GreyNoise has identified a coordinated credential-based campaign abusing VPN login portals from Cisco and Palo Alto Networks. palo altocso onlineattackersbringpasswords https://www.csoonline.com/article/3997429/risk-assessment-vital-when-choosing-an-ai-model-say-experts.html Most LLMs don't pass the security sniff test | CSO Online May 29, 2025 - CISOs are advised to apply the same evaluation discipline to AI as they do to any other app in the enterprise. cso onlinellmspasssecuritysniff https://www.csoonline.com/article/4154239/how-ai-is-transforming-threat-detection.html How AI is transforming threat detection | CSO Online Apr 14, 2026 - Machine learning is helping cyber teams process telemetry at scale to more quickly identify behavioral anomalies that might otherwise remain buried in the... threat detectioncso onlineai https://www.csoonline.com/article/4108496/cisco-confirms-zero-day-exploitation-of-secure-email-products.html Cisco confirms zero-day exploitation of Secure Email products | CSO Online Dec 18, 2025 - The unpatched flaw affects AsyncOS-based Secure Email appliances, with Cisco investigating scope and urging rebuilds in confirmed compromise cases. zero daysecure emailcso onlineciscoexploitation https://www.csoonline.com/article/4162446/microsoft-taps-anthropics-mythos-to-strengthen-secure-software-development.html Microsoft taps Anthropic’s Mythos to strengthen secure software development | CSO Online Apr 23, 2026 - The move is a clear signal that powerful AI models are making inroads into real software security work. secure software developmentcso onlinemicrosofttapsmythos https://www.csoonline.com/au/careers/ Careers | CSO Online Careers | News, how-tos, features, reviews, and videos cso onlinecareers https://www.csoonline.com/article/2075528/cisco-security-teams-are-overconfident-about-handling-next-gen-threats.html Cisco: Security teams are ‘overconfident’ about handling next-gen threats | CSO Online Apr 28, 2025 - Tooling complexity and generative AI may harm many companies’ security posture. cisco securitynext gencso onlineteamshandling https://www.csoonline.com/article/4152117/fortinet-hit-by-another-exploited-cybersecurity-flaw.html Fortinet hit by another exploited cybersecurity flaw | CSO Online Mar 30, 2026 - A critical SQL injection flaw in FortiClient EMS allows remote code execution and data exfiltration, leaving thousands of internet facing systems at risk. cso onlinefortinethitanotherexploited https://www.csoonline.com/video/1310469/why-ransomware-is-still-a-major-concern-for-healthcare-systems.html Why ransomware is still a major concern for healthcare systems | CSO Online for healthcarecso onlineransomwarestillmajor https://www.csoonline.com/cloud-security/page/2/ Cloud Security | Page 2 | CSO Online Cloud Security | News, how-tos, features, reviews, and videos - Page 2 cloud securitypage 2cso online https://www.csoonline.com/article/3954647/big-hole-in-big-data-critical-deserialization-bug-in-apache-parquet-allows-rce.html Big hole in big data: Aparche Parquet has a ritical deserialization bug | CSO Online Apr 4, 2025 - Successful exploitation could allow attackers to steal data, install malware, or take full control over affected big data systems. big holein datacso onlineparquetdeserialization https://www.csoonline.com/au/videos/ Videos | CSO Online cso onlinevideos https://www.csoonline.com/article/4156822/cloudflare-actively-adjusting-quantum-priorities-in-wake-of-google-warning.html Cloudflare ‘actively adjusting’ quantum priorities in wake of Google warning | CSO Online Apr 9, 2026 - Google’s accelerated post-quantum cryptography (PQC) deadline is spurring other vendors to revise plans. cso onlinecloudflarequantumprioritieswake https://www.csoonline.com/article/4162596/offer-customers-passkeys-by-default-uks-ncsc-tells-enterprises-2.html Offer customers passkeys by default, UK’s NCSC tells enterprises | CSO Online Apr 23, 2026 - Developers of enterprise apps and websites will need to get to grips with passkeys: The UK's National Cyber Security Center the agency recommends them for... cso onlineoffercustomerspasskeysdefault https://www.csoonline.com/article/518982/tabletop-exercise-scenarios.html Tabletop exercise scenarios: 10 tips, 6 examples | CSO Online Apr 23, 2025 - A tabletop exercise is a discussion-based session to test your team on roles and responses during for emergency scenarios. Here are example scenarios and tips... tabletop exercisecso onlinescenariostipsexamples https://www.csoonline.com/network-security/page/2/ Network Security | Page 2 | CSO Online Network Security | News, how-tos, features, reviews, and videos - Page 2 network securitypage 2cso online https://www.csoonline.com/article/4154226/escaping-the-cots-trap.html Escaping the COTS trap | CSO Online Apr 6, 2026 - Architectural patterns for strategic agility in enterprise cybersecurity systems. cso onlineescapingcotstrap https://www.csoonline.com/article/4097728/eu-chat-control-proposals-should-be-red-flag-to-businesses-everywhere.html EU ‘Chat Control’ proposals should be red flag to businesses everywhere | CSO Online Nov 27, 2025 - Voluntary monitoring of communications by providers remains a threat, say privacy advocates. red flagcso onlineeuproposalsbusinesses https://www.csoonline.com/in/brandposts/ BrandPosts | CSO Online cso onlinebrandposts https://www.csoonline.com/article/4147674/telnet-vulnerability-opens-door-to-remote-code-execution-as-root.html Telnet vulnerability opens door to remote code execution as root | CSO Online Mar 19, 2026 - The flaw in a legacy Telnet implementation enables pre-auth remote code execution, exposing affected systems to full compromise. remote code executioncso onlinetelnetvulnerabilityopens https://www.csoonline.com/article/4072292/beyond-the-checklist-building-adaptive-grc-frameworks-for-agentic-ai.html Beyond the checklist: Building adaptive GRC frameworks for agentic AI | CSO Online Oct 15, 2025 - Checklists won’t cut it anymore — AI moves too fast. GRC needs to adapt in real time, understand AI’s intent and keep humans in the loop. the checklistagentic aicso onlinebeyondbuilding https://www.csoonline.com/article/4093058/3-ways-cisos-can-win-over-their-boards-this-budget-season.html 3 ways CISOs can win over their boards this budget season | CSO Online Nov 20, 2025 - To land your budget, show the board the real financial risk, plan past compliance and speak their language — not just security jargon. cso onlinewayscisoswinboards https://www.csoonline.com/enterprise/ Enterprise – CSO Online Enterprise | News, how-tos, features, reviews, and videos cso onlineenterprise https://www.csoonline.com/video/509310/zero-trust-networks-and-enterprise-security-strategy-salted-hash-ep-12.html Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 | CSO Online zero trustenterprise securitycso onlinenetworksstrategy https://www.csoonline.com/communications-security/ Communications Security – CSO Online Communications Security | News, how-tos, features, reviews, and videos communications securitycso online https://www.csoonline.com/article/4154550/supply-chain-security-is-now-a-board-level-issue-heres-what-csos-need-to-know.html Supply chain security is now a board-level issue: Here's what CSOs need to know | CSO Online Apr 7, 2026 - Security isn't just your problem anymore — it's the board's. With 97% of apps using open-source, CSOs need to ditch the false positives and get serious about... supply chain securityneed to knowcso onlineboardlevel https://www.csoonline.com/article/3596263/take-action-now-to-plug-windows-themes-vulnerability-says-expert.html Take action now to plug Windows Themes vulnerability, says expert | CSO Online May 7, 2025 - Admins need to block access to external Windows file shares and NTLM traffic. take action nowcso onlineplugwindowsthemes https://www.csoonline.com/article/4074945/network-security-devices-endanger-orgs-with-90s-era-flaws.html Network security devices endanger orgs with ’90s era flaws | CSO Online Oct 20, 2025 - Built to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in zero-day exploits of what experts... network securitycso onlinedevicesera https://www.csoonline.com/article/4143451/jack-jill-went-up-the-hill-and-an-ai-tried-to-hack-them-2.html Jack & Jill went up the hill — and an AI tried to hack them | CSO Online the hillcso onlinejackjillwent https://www.csoonline.com/video/508790/creating-a-multicloud-security-architecture-idgs-cio-think-tank.html Creating a multicloud security architecture: IDG’s CIO Think Tank | CSO Online security architecturethink tankcso onlinecreatingmulticloud https://www.csoonline.com/article/3491814/sbom-erklart-was-ist-eine-software-bill-of-materials.html SBOM erklärt: Was ist eine Software Bill of Materials? | CSO Online Apr 21, 2026 - Eine Software Bill of Materials (SBOM) hilft, Softwarekomponenten im Blick zu behalten und die Softwarelieferkette abzusichern. Das sollten Sie wissen. bill of materialscso onlinesbomisteine https://www.csoonline.com/careers/ Careers | CSO Online Careers | News, how-tos, features, reviews, and videos cso onlinecareers https://www.csoonline.com/video/1267706/focusing-on-the-metrics-of-most-value-to-cisos.html Preventing the Cracks from Becoming a Hole that Becomes a Crater | CSO Online cso onlinepreventingcracksbecominghole https://www.csoonline.com/blogs/infosec-service/ InfoSec at Your Service | CSO Online at your servicecso onlineinfosec https://www.csoonline.com/article/3853759/10-best-practices-for-vulnerability-management-according-to-cisos.html 10 best practices for vulnerability management according to CISOs | CSO Online Apr 2, 2025 - After years of neglect, organizations are investing in vulnerability management programs to address business risk. A dozen CISOs offer lessons learned and best... 10 bestvulnerability managementaccording tocso onlinepractices https://www.csoonline.com/article/567745/soapa-vs-soar-how-these-security-terms-differ.html SOAPA vs. SOAR: How these security terms differ | CSO Online Sep 13, 2019 - SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics... cso onlinevssoarsecurityterms https://www.csoonline.com/article/4143444/9-ways-cisos-can-combat-ai-hallucinations.html 9 ways CISOs can combat AI hallucinations | CSO Online Apr 1, 2026 - AI-based compliance assessment tools might not be ready for fully independent assessments, if CISOs are using these tools we share some best practices to... ai hallucinationscso onlinewayscisoscombat https://www.csoonline.com/article/571821/12-steps-to-take-when-there-s-an-active-adversary-on-your-network.html 12 steps to take when there’s an active adversary on your network | CSO Online May 7, 2025 - These steps will help you respond quickly, without letting a crisis turn into chaos. 12 stepscso onlinetakeactivenetwork https://www.csoonline.com/article/648944/north-korea-hacked-into-russian-missile-company-report.html North Korea hacked into Russian missile company: Report | CSO Online Aug 8, 2023 - SentinelLabs analyzed leaked emails and associated implants to confirm two North Korea-backed hacker groups intruded into a Russian missile maker. north koreacso onlinehackedrussianmissile https://www.csoonline.com/expert-contributor-network/ Join the Foundry Expert Contributor Network! | CSO Online Register now to tell your stories to the readers of CIO, Computerworld, CSO, InfoWorld and Network World. the foundrycontributor networkcso onlinejoinexpert https://www.csoonline.com/budgeting/ Budgeting – CSO Online Budgeting | News, how-tos, features, reviews, and videos cso onlinebudgeting https://www.csoonline.com/article/4130151/solarwinds-whd-zero-days-from-january-are-under-attack.html SolarWinds WHD zero-days from January are under attack | CSO Online Feb 11, 2026 - Analysis of real-world incidents reveals that attackers are chaining multiple flaws to compromise the ticketing and support application. cso onlinesolarwindswhdzerodays https://www.csoonline.com/article/4155175/5-steps-to-strengthen-supply-chain-security-and-improve-cyber-resilience.html 5 steps to strengthen supply chain security and improve cyber resilience | CSO Online Apr 7, 2026 - From mapping dependencies to immutable recovery—strategic steps to reduce your blast radius in an interconnected world. supply chain securitycyber resiliencecso onlinestepsstrengthen https://www.csoonline.com/privacy/ Privacy | CSO Online Privacy | News, how-tos, features, reviews, and videos cso onlineprivacy https://www.csoonline.com/article/4161008/why-identity-is-the-driving-force-behind-digital-transformation.html Why identity is the driving force behind digital transformation | CSO Online Apr 21, 2026 - Identity isn't just about logging in anymore; it’s the digital transformationcso onlineidentitydrivingforce https://www.csoonline.com/uk/privacy/ Privacy | CSO Online Privacy | News, how-tos, features, reviews, and videos cso onlineprivacy https://www.csoonline.com/article/3511483/china-based-cyber-espionage-campaign-in-se-asia-is-expanding-says-sophos.html China-based cyber espionage campaign in SE Asia is expanding, says Sophos | CSO Online Apr 30, 2025 - Sophos report says the Crimson Palace campaign that started in 2023 has expanded to several more countries. cyber espionagese asiacso onlinechinabased https://www.csoonline.com/article/4145127/runtime-the-new-frontier-of-ai-agent-security.html Runtime: The new frontier of AI agent security | CSO Online Mar 18, 2026 - Security leaders say monitoring agent behavior inside enterprise systems may be the next major challenge for CISOs. ai agent securitycso onlineruntimenewfrontier https://www.csoonline.com/article/4153742/eviltokens-abuses-microsoft-device-code-flow-for-account-takeovers.html EvilTokens abuses Microsoft device code flow for account takeovers | CSO Online Apr 2, 2026 - The phishing-as-a-service toolkit leverages legitimate authentication to capture tokens and access Microsoft 365 services. account takeoverscso onlineabusesmicrosoftdevice https://www.csoonline.com/de/artificial-intelligence/ Artificial Intelligence | CSO Online Artificial Intelligence | News, How-tos, Features, Reviews und Videos artificial intelligencecso online https://www.csoonline.com/article/4154546/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions.html The noisy tenants: Engineering fairness in multi-tenant SIEM solutions | CSO Online Apr 7, 2026 - Cloud SIEMs are great until a cso onlinenoisytenantsengineeringfairness https://www.csoonline.com/article/564832/biggest-healthcare-security-threats.html 7 biggest healthcare security threats | CSO Online Apr 15, 2026 - Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, phishing, AI usage, and smart devices to be their... healthcare securitycso onlinebiggestthreats https://www.csoonline.com/article/3618133/8-biggest-cybersecurity-threats-manufacturers-face.html 8 biggest cybersecurity threats manufacturers face | CSO Online Sep 17, 2025 - The manufacturing sector remains a prominent target for cybercriminals, due to complex supply chains, legacy industry control and IoT systems, and a lack of... cybersecurity threatscso onlinebiggestmanufacturersface https://www.csoonline.com/cyberattacks/ Cyberattacks – CSO Online Cyberattacks | News, how-tos, features, reviews, and videos cso onlinecyberattacks https://www.csoonline.com/article/2518328/inside-the-worlds-largest-live-fire-cyber-defense-exercise.html Inside the world’s largest ‘live-fire’ cyber-defense exercise | CSO Online Apr 22, 2025 - From the Retamares military base in Madrid, CSO Spain receives an inside look at the Spanish team’s headquarters for Locked Shields 2024, a worldwide event for... cyber defensecso onlineinsidelargestexercise https://www.csoonline.com/article/4110699/8-things-cisos-cant-afford-to-get-wrong-in-2026.html 8 things CISOs can’t afford to get wrong in 2026 | CSO Online Feb 24, 2026 - AI, cloud, and the increasingly interconnected nature of business and technology present CISOs with a range of risks and threats that will be particularly... cso onlinethingscisosaffordget https://www.csoonline.com/article/4057472/crowdstrike-bets-big-on-agentic-ai-with-new-offerings-after-290m-onum-buy.html CrowdStrike bets big on agentic AI with new offerings after $290M Onum buy | CSO Online Sep 17, 2025 - At its Fal.Con conference, the cybersecurity giant launched its Agentic Security Platform and Agentic Security Workforce, aiming to outpace AI-driven... agentic aicso onlinecrowdstrikebetsbig https://www.csoonline.com/article/4092639/empathy-meets-it-security-the-path-to-active-compliance.html Empathetic policy engineering: The secret to better security behavior and awareness | CSO Online Nov 28, 2025 - Users often see IT security policies as a hindrance. Empathetic policy engineering helps CISOs to promote acceptance and implement security effectively. the secretbetter securitycso onlinepolicyengineering https://www.csoonline.com/asean/enterprise-buyers-guide/ Buyer’s Guides | CSO Online CSO Online’s Enterprise Buyer’s Guides are essential assets to help buyers choose the right security technology solution for their business. Crafted by our... cso onlineguides https://www.csoonline.com/article/4013155/so-geht-post-incident-review.html So geht Post-Incident Review | CSO Online Apr 8, 2026 - Incident Response ist nicht damit erledigt, Security-Vorfälle einzudämmen und zu beheben. Es ist unabdingbar, diese auch in einem strukturierten Prozess... cso onlinepostincidentreview https://www.csoonline.com/au/vulnerabilities/ Vulnerabilities | CSO Online Vulnerabilities | News, how-tos, features, reviews, and videos cso onlinevulnerabilities https://www.csoonline.com/asean/critical-infrastructure/ Critical Infrastructure | CSO Online Critical Infrastructure | News, how-tos, features, reviews, and videos critical infrastructurecso online https://www.csoonline.com/asean/cloud-security/ Cloud Security | CSO Online Cloud Security | News, how-tos, features, reviews, and videos cloud securitycso online https://www.csoonline.com/article/3610611/rising-clickfix-malware-distribution-trick-puts-powershell-it-policies-on-notice.html Rising ClickFix malware distribution trick puts PowerShell IT policies on notice | CSO Online Apr 30, 2025 - IT teams should revisit PowerShell restrictions as an increasingly used click-and-fix technique has users self-serving fake system issues by invoking malicious... it policiescso onlinerisingmalwaredistribution https://www.csoonline.com/article/4138749/silent-google-api-key-change-exposed-gemini-ai-data.html ‘Silent’ Google API key change exposed Gemini AI data | CSO Online Feb 27, 2026 - Billing ID keys were turned into Gemini authentication credentials without informing developers. google apikey changegemini aicso onlineexposed https://www.csoonline.com/uk/it-leadership/ Leadership | CSO Online IT Leadership | News, how-tos, features, reviews, and videos cso onlineleadership https://www.csoonline.com/blogs/security-intelligence/ Security Intelligence | CSO Online security intelligencecso online https://www.csoonline.com/au/industry/ Industry | CSO Online Industry | News, how-tos, features, reviews, and videos cso onlineindustry https://www.csoonline.com/article/4081492/modern-supply-chain-attacks-and-their-real-world-impact.html Modern supply-chain attacks and their real-world impact | CSO Online Nov 6, 2025 - Supply-chain attacks have evolved considerably in the last two years going from dependency confusion or stolen SSL among others once common attacks to... supply chain attacksreal worldcso onlinemodernimpact https://www.csoonline.com/article/569659/the-state-of-security-hiring-jobs-skills-and-salaries.html The state of US security hiring: Jobs, skills, and salaries | CSO Online Jul 26, 2021 - We look at the trends in cybersecurity hiring today, including the most in-demand jobs and skills and the hottest markets—and what it will take to attract and... the statecso onlineussecurityhiring https://www.csoonline.com/video/509100/whats-ahead-for-cybersecurity-in-2019-tech-talk.html What’s ahead for cybersecurity in 2019: TECH(talk) | CSO Online in 2019tech talkcso onlineaheadcybersecurity https://www.csoonline.com/article/556309/critical-it-policies-you-should-have-in-place.html 5 critical IT policies every organization should have in place | CSO Online May 7, 2025 - From acceptable use policies to remote work guidelines, identifying the rules and procedures for all individuals accessing your organization’s IT resources is... it policiesin placecso onlinecriticalevery