https://www.csoonline.com/article/2119281/hijack-of-monitoring-devices-highlights-cyber-threat-to-solar-power-infrastructure.html
Apr 25, 2025 - An attack on remote monitoring devices in Japan underscores an emerging cybersecurity threat to the rapidly growing solar component of the power grid....
monitoring devicessolar powerhijackhighlightscyber
https://www.csoonline.com/article/3513774/anz-cios-see-cybersecurity-as-top-priority-for-2025.html
May 7, 2025 - With cyberattacks and regulations on the rise, risk management is coming under greater scrutiny across Australia and New Zealand. CIOs are responding with more...
top priorityanzciosseecybersecurity
https://www.csoonline.com/article/560813/what-enterprises-should-take-away-from-the-cia-leak.html
Mar 28, 2017 - Three lessons enterprises can learn from the recent WikiLeaks Vault 7 data leak that exposed CIA exploits.
take awayenterprisescialeakcso
https://www.csoonline.com/article/3817394/macos-ferret-operators-add-a-deceptive-bite-to-their-malware-family.html
Feb 5, 2025 - Flexible-Ferret is an evasive variant being used in the “Contagious Interview” campaign that even upgraded Apple protections can’t flag.
macosferretoperatorsadddeceptive
https://www.csoonline.com/au/careers/
Careers | News, how-tos, features, reviews, and videos
cso onlinecareers
https://www.csoonline.com/article/4009247/5-multicloud-security-challenges-and-how-to-address-them.html
Oct 8, 2025 - From inadequate visibility to access management complexity, multicloud environments take baseline cloud security issues to another level.
multicloudsecuritychallengesaddress
https://www.csoonline.com/article/3496028/aws-reinvent-2023-mehr-sicherheit-per-handabdruck.html
Dec 11, 2024 - Amazon Web Services hat auf seiner Hausmesse in Las Vegas auch neue Security-Angebote präsentiert. Allen voran ein biometrisches Sicherheitssystem.
cso onlineawsinventmehrsicherheit
https://www.csoonline.com/article/4111148/amazon-has-stopped-1800-job-applications-from-north-korean-agents.html
Dec 23, 2025 - The company states that it has seen several recurring patterns in the applications.
north koreanamazonstoppedjobapplications
https://www.csoonline.com/article/4110569/pirate-activists-have-copied-spotifys-entire-music-library.html
Dec 22, 2025 - Spotify says it is actively investigating the incident.
music librarypirateactivistscopiedspotify
https://www.csoonline.com/article/4131530/the-foundation-problem-how-a-lack-of-accountability-is-destroying-cybersecurity.html
Feb 13, 2026 - The Navy trains 18-year-olds to run nukes, so why can't we train security analysts? The
foundationproblemlackaccountabilitydestroying
https://www.csoonline.com/article/3982379/deepfake-attacks-are-inevitable-cisos-cant-prepare-soon-enough.html
May 13, 2025 - Security leaders must develop a multi-layered strategy to defend against deepfake voice and video attacks, which experts expect to increase quickly in volume...
deepfakeattacksinevitablecisosprepare
https://www.csoonline.com/article/4086474/wie-cisos-vom-erp-leid-profitieren.html
Nov 7, 2025 - ERP-Migrationen haben CIOs in der Vergangenheit viele Qualen bereitet. CISOs können diese Erfahrungen nutzen, um erfolgreich(er) umzusteigen – auf eine...
cso onlinewiecisosvomerp
https://www.csoonline.com/article/4055176/ot-security-why-it-pays-to-look-at-open-source.html
Sep 11, 2025 - Commercial OT security solutions can be very expensive. Here are some alternatives.
ot securityopen sourcepayslook
https://www.csoonline.com/article/3493104/5-top-cybersecurity-zertifizierungen-so-pushen-sie-ihre-ciso-karriere.html
Jan 8, 2026 - Cybersecurity-Zertifizierungen sind zwar keine Voraussetzung für den Job. Sie können jedoch den Lebenslauf von CISOs aufwerten und der Karriere einen Schub...
topcybersecurityzertifizierungensieihre
https://www.csoonline.com/careers/
Careers | News, how-tos, features, reviews, and videos
cso onlinecareers
https://www.csoonline.com/article/4080699/10-promising-cybersecurity-startups-cisos-should-know-about.html
Nov 6, 2025 - From NHI security to deepfake detection and securing the agentic enterprise, these startups have the products, pedigree, track record, and vision to be worthy...
cso onlinepromisingcybersecuritystartupscisos
https://www.csoonline.com/article/646644/why-whistleblowers-in-cybersecurity-are-important-and-need-support.html
May 6, 2025 - Security workers who want to come forward about wrongdoings risk retaliation and fear not making a difference. Should society do more to support them?
need supportwhistleblowerscybersecurityimportantcso
https://www.csoonline.com/article/3495924/mitarbeiterfluktation-und-haftung-das-sollten-cisos-2024-beachten.html
Dec 11, 2024 - Das bringt 2024 für CISOs: Mehr Anerkennung aber auch Anforderungen wie Mitarbeiterbindung und im Krisenfall persönlich haften zu müssen.
cso onlineundhaftungdascisos
https://www.csoonline.com/article/3979024/the-8-security-metrics-that-matter-most.html
May 7, 2025 - When it comes to assessing cybersecurity performance, the truth can be found in the numbers. Here are the essential KPIs to measure, monitor, and improve to...
security metricscso onlinematter
https://www.csoonline.com/article/4117149/schlag-gegen-cyberkriminelle-in-deutschland.html
Jan 15, 2026 - Mehr als eine Million Phishing-Mails pro Tag und ein riesiger Schaden: Ein Rechenzentrum in Deutschland war das Herzstück eines globalen Betrugsnetzwerks, das...
cso onlineschlagdeutschland
https://www.csoonline.com/video/4106575/inside-visas-cyber-defense-ciso-subra-kumaraswamy-on-blending-ai-and-human-defense.html
Dec 15, 2025
cyber defenseinsidecisoai
https://www.csoonline.com/article/3560604/driven-to-drink-how-cybersecurity-professionals-are-dealing-with-stress-related-substance-abuse.html
May 28, 2025 - The constant pressure of the CISO role can lead to burnout and in some cases drinking or drug abuse, compounding isolation and stress. Some are speaking out...
substance abusecisosgrapplegrowingconcern
https://www.csoonline.com/article/3981296/die-acht-wichtigsten-sicherheitsmetriken.html
Jun 10, 2025 - Zur Bewertung der Cybersicherheitsleistung sind Kennzahlen entscheidend – das sind die wichtigsten KPIs zur Überwachung und Optimierung eines effektiven...
cso onlinedieacht
https://www.csoonline.com/article/4067501/cl0p-linked-threat-actors-target-oracle-e-business-suite-in-extortion-campaign.html
Oct 3, 2025 - Cl0p-linked threat actors are targeting Oracle E-Business Suite users with spear-phishing emails claiming theft of sensitive ERP data.
business suiteoracleuserstargetedextortion
https://www.csoonline.com/article/3560348/palo-alto-networks-erliegt-lampenschirm-shitstorm.html
Oct 15, 2024 - Der Auftritt von Palo Alto Networks auf der Black-Hat-Konferenz in Las Vegas sorgt noch Tage nach der Messe für Furore. Allerdings aus den falschen Gründen.
palo alto networkscso onlineshitstorm
https://www.csoonline.com/profile/evan-schuman/
New genAI capabilities from Asana and a recent interview with Zoom CEO Eric Yuan show how important it may soon be for IT leaders to lead the discussion on AI...
cso onlineevan
https://www.csoonline.com/article/3829736/why-attackers-target-companys-solar-energy-system-and-how-to-stop-them.html
Mar 3, 2025 - Businesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.
solar energy systemscyberattackerstargeting
https://www.csoonline.com/article/4123184/always-on-privileged-access-is-pervasive-and-fraught-with-risks.html
Jan 28, 2026 - 91% of users log in at their highest level of privilege, which cyber experts see as a symptom of lax IT governance, laziness, and increasingly complex IT...
privileged accessalwayspervasive
https://www.csoonline.com/article/4108496/cisco-confirms-zero-day-exploitation-of-secure-email-products.html
Dec 18, 2025 - The unpatched flaw affects AsyncOS-based Secure Email appliances, with Cisco investigating scope and urging rebuilds in confirmed compromise cases.
zero daysecure emailciscoconfirmsexploitation
https://www.csoonline.com/article/2095178/cisco-urges-immediate-software-upgrade-after-state-sponsored-attack.html
May 8, 2025 - Hackers exploited previously undetected vulnerabilities in Cisco’s Adaptive Security Appliances — a product that combines multiple cybersecurity functions.
ciscourgesimmediatesoftwareupgrade
https://www.csoonline.com/article/3801012/gen-ai-strategies-put-cisos-in-a-stressful-bind.html
Apr 4, 2025 - Executives are aggressively pressing for all manner of genAI deployments and experimentation despite knowing the risks — and CISOs are left holding the risk...
cso onlinegenaistrategiesputcisos
https://www.csoonline.com/uk/business-operations/
Business Operations | News, how-tos, features, reviews, and videos
security operationscso online
https://www.csoonline.com/article/4132950/from-in-house-ciso-to-consultant-what-you-need-to-know-before-making-the-leap.html
Feb 19, 2026 - The move from in-house CISO to consultant promises autonomy and impact, but it also forces security leaders to rethink both their skill set and their mindset.
housecisoconsultantneed
https://www.csoonline.com/article/4094519/from-code-to-boardroom-a-genai-grc-approach-to-supply-chain-risk.html
Nov 21, 2025 - GenAI GRC flips supply chain risk from paperwork to real-time smarts, helping CISOs spot trouble early and keep the board focused on resilience.
codeboardroomgenaigrcapproach
https://www.csoonline.com/article/572547/kyndryl-rolls-out-dell-partnership-for-disaster-recovery-and-security.html
Aug 10, 2023 - New offering aims to synchronize disaster recovery and business continuity with cybersecurity.
dell partnershipdisaster recoverykyndrylrollssecurity
https://www.csoonline.com/article/3480918/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html
May 8, 2025 - Microsoft stands out from the authenticator crowd by annihilating accounts when new accounts are introduced via QR code. Despite user complaints for years, no...
microsoft authenticatordesignflawmfaaccounts
https://www.csoonline.com/article/4057785/cobaltstrikes-ai-native-successor-villager-makes-hacking-too-easy.html
Sep 16, 2025 - The new AI-native framework, freely available online, could make advanced cyberattacks faster, easier, and more accessible than ever.
ai nativesuccessormakeshackingeasy
https://www.csoonline.com/article/4090107/bundestag-beschliest-nis2-umsetzung.html
Nov 14, 2025 - Nachdem die EU-Frist längst abgelaufen ist, hat der Bundestag nun das NIS2-Umsetzungsgesetz beschlossen. Aus Expertenkreisen hagelt es noch immer Kritik.
cso onlinebundestagumsetzung
https://www.csoonline.com/article/3839461/hiring-privacy-experts-is-tough-heres-why.html
Apr 7, 2025 - Unrealistic expectations by hiring managers paired with budget constraints are some of the impediments to hiring experts in privacy, on top of the constant...
cso onlinehiringprivacyexpertstough
https://www.csoonline.com/video/509005/what-the-ftc-s-5-billion-fine-really-means-for-facebook-tech-feed.html
Jul 16, 2019
billionfinereallymeansfacebook
https://www.csoonline.com/article/4101936/ignoring-ai-in-the-threat-chain-could-be-a-costly-mistake-experts-warn.html
Dec 9, 2025 - While some researchers dismiss reports of AI-driven cyberattacks as merely marketing messages, threat intel experts counter that CISOs ignore mounting evidence...
ignoringaithreatcould
https://www.csoonline.com/article/4118159/cisco-finally-patches-seven-week-old-zero-day-flaw-in-secure-email-gateway-products-2.html
Jan 16, 2026 - Chinese hackers are behind attacks on AsyncOS Software that allow complete takeover of the appliance, the company says.
zero dayciscofinallypatchesseven
https://www.csoonline.com/article/572969/snowflake-offers-cybersecurity-data-platform-with-security-app-integrations.html
Jun 9, 2022 - Snowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for...
data platformapp integrationssnowflakeofferscybersecurity
https://www.csoonline.com/article/3632268/gen-ai-is-transforming-the-cyber-threat-landscape-by-democratizing-vulnerability-hunting.html
May 9, 2025 - Large language models (LLMs) are proving to be valuable tools for discovering zero-days, bypassing detection, and writing exploit code, thereby lowering the...
gen aitransformingvulnerabilityhuntingpen
https://www.csoonline.com/article/4022498/nis2-umsetzungsgesetz-geschaftsleitung-haftet-mit-privatvermogen.html
Jul 22, 2025 - Die Umsetzung der NIS2-Richtlinie ist eine schwere Geburt, die weiterhin andauert. Trotzdem haben Unternehmen keine Zeit zu verlieren – im Gegenteil.
cso onlinemit
https://www.csoonline.com/article/3843143/google-paid-out-almost-120-million-to-bug-hunters-last-year.html
Apr 7, 2025 - The company says it has paid out over $65 million since its bug hunting program started.
last yeargooglepaidnearlymillion
https://www.csoonline.com/article/3808598/cisco-patches-antivirus-decommissioning-bug-as-exploit-code-surfaces.html
Apr 23, 2025 - The flaw could allow remote attackers to shut down ClamAV scanning and compromise critical security workflows.
ciscopatchesantivirusdecommissioningbug
https://www.csoonline.com/article/4105766/gladinet-servers-file-sharing-servers-allow-remote-code-execution.html
Dec 12, 2025 - Static AES keys are enabling attackers to decrypt access tokens and reach remote code execution, triggering urgent patch guidance
remote code executionfile sharingserversallowcso