featureWhat is the CIA triad? A principled framework for defining infosec policiesThe CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure — but tradeoffs are necessary in real-world scenarios.By Josh FruhlingerJul 12, 202411 minsData and Information SecuritySecurity brandpostSponsored by CyberArk Identity security: The keystone of trustBy Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity SecurityJul 09, 20248 minsSecurityfeature CRISC certification: Exam, requirements, training, potential salaryBy Josh FruhlingerJul 09, 20248 minsCertificationsIT SkillsIT Training featureLogic bombs explained: Definition, examples, preventionBy Josh Fruhlinger Jul 05, 202412 minsMalwareCybercrimeSecurity how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet Jul 04, 202416 minsRansomwarePhishingDisaster Recovery feature10 most powerful cybersecurity companies todayBy Neal Weinberg Jul 02, 202414 minsAccess ControlIdentity Management SolutionsMcAfee featureThe CSO guide to top security conferencesBy CSO Staff Jun 28, 202410 minsTechnology IndustryIT SkillsEvents brandpostSponsored by Cyber NewsWireInfinidat Revolutionizes Enterprise Cyber Storage Protection to Reduce Ransomware and Malware Threat WindowsBy Cyber NewsWire – Paid Press Release Jun 27, 20247 minsRansomwareCyberattacksSecurity feature7 open source security tools too good to ignoreBy Peter Wayner and Fahmida Rashid Jun 27, 202412 minsOpen SourceSecurity ArticlesbrandpostSponsored by Microsoft SecurityBuilding the foundation for secure Generative AISecuring Generative AI: Mitigating security risks and building trust for enterprise adoptionBy Microsoft Security Jun 26, 2024 5 minsMachine LearningSecuritybrandpostSponsored by Microsoft SecurityUnlocking the potential of Generative AI starts with a secure foundationSecuring generative AI: Navigating risks, building trust, and ensuring responsible adoption today. By Microsoft Security Jun 26, 2024 4 minsMachine LearningSecuritybrandpostSponsored by Palo Alto NetworksHow do we protect and maintain the security of the modern browser?Prioritizing enterprise browsers and embracing advanced SASE technologies helps organizations safeguard digital assets and ensures resilience in an increasingly interconnected and dynamic digital environment.By Ofer Ben-Noon, SASE CTO, Palo Alto Networks Jun 25, 2024 5 minsSecurityfeature6 ways the CISO role is evolving todayTop IT security execs are rising in prominence, increasing their business acumen, and branching into new arenas, as they become the company’s key purveyor of trust. By Esther Shein Jun 25, 2024 12 minsCSO and CISOCareersIT LeadershipfeatureWhat is swatting? Criminal harassment falsely involving armed policeSwatting is a form of criminal harassment in which attackers “prank call” law enforcement to trick police into surrounding unsuspecting homes — and the resulting confrontations can go very badly.By Josh Fruhlinger Jun 21, 2024 10 minsCyberattacksSecurityfeature2024 CSO Hall of Fame honoreesThis year's honorees will be recognized at the CSO Conference + Awards at We-Ko-Pa Casino Resort, Fort McDowell, AZ October 21-23, 2024By CSO events Jun 17, 2024 4 minsData and Information SecurityRisk ManagementCareersnewsMicrosoft president faces tough questions from Congress on China, securityMicrosoft president Brad Smith promised a renewed focus on security, a year after a major attack on the company’s Exchange email service attributed to a Chinese group.By John Leyden Jun 14, 2024 4 minsEmail SecurityCloud SecuritySecurityfeatureWhat is Tor Browser? Software for protecting your identity onlineTor Browser offers the best anonymous web browsing available today, and researchers are hard at work improving Tor’s anonymity properties.By J.M. Porup Jun 14, 2024 12 minsInternetPrivacySecuritynewsIT downtime cuts enterprise profit by 9%, says studyCIOs and CSOs would save large enterprises $200 million a year if they could eliminate downtime — and should budget more for dealing with ransomware, according to research by Splunk.By Shweta Sharma Jun 11, 2024 1 minRansomwareSecurityfeatureCertified Ethical Hacker (CEH): Certification cost, training, and valueCertified Ethical Hacker (CEH) is an early-career certification for security pros interested in assessing target systems using techniques often associated with hackers to help identify vulnerabilities for employers or clients. Learn how it will impact your job and salary and how to decide if this cert is right for you.By Josh Fruhlinger Jun 11, 2024 9 minsCertificationsPenetration TestingCareersfeatureWhitelisting explained: How it works and where it fits in a security programWhitelisting locks down computers so only approved applications can run. Is the security worth the administrative hassle?By Josh Fruhlinger and CSO Staff Jun 07, 2024 10 minsEmail SecurityApplication SecurityData and Information SecurityinterviewHow Amazon CISO Amy Herzog responds to cybersecurity challengesAmazon CISO for devices and advertising products and services describes how her team works with product and devops teams to ensure products are cybersecure.By David Strom Jun 07, 2024 5 minsSecurity PracticesVulnerabilitiesSecurity Show more Show less View all Upcoming Events21/Oct-23/Oct awards CSO50 Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity 21/Oct-23/Oct awards CSO Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Cyber Resilience Checklist Understand the top cybersecurity facts and trends, and know the steps to better secure your organization against cyber risks The post Cyber Resilience Checklist appeared first on Whitepaper Repository –. By Dell SecureWorks 12 Jul 2024Business OperationsCyberattacksSecurity whitepaper Navigating Cybersecurity with an Effective Security Operations Center By Dell SecureWorks 12 Jul 2024Business OperationsCyberattacksSecurity whitepaper The Strategic Advantage of MDR Delivered on an Open Platform By Dell SecureWorks 12 Jul 2024Business OperationsData and Information SecuritySecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.4 episodesData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO