opinionContinuous red-teaming is your only AI risk defenseThe sheer volume of new and unknown threats coming our way — as well as the lack of fully formed risk frameworks for AI — means that red-team continuous monitoring is not only essential but perhaps your only path to security.By David Gee26 Jun 20247 minsPenetration TestingData and Information SecurityRisk Management feature Is it time to split the CISO role?By Rosalyn Page19 Jun 20249 minsCSO and CISORisk ManagementCareersnews A new fear for CSOs: The sky is fallingBy Lynn Greiner17 Jun 20245 minsThreat and Vulnerability ManagementRisk ManagementVulnerabilities featureThe risks in mergers and acquisitions CISOs need to knowBy Aimee Chanthadavong 11 Jun 20248 minsCyberattacksMergers and AcquisitionsRisk Management feature3 reasons users can’t stop making security mistakes — unless you address themBy Ariella Brown 31 May 20245 minsData BreachRisk Management opinionEmployee discontent: Insider threat No. 1By Christopher Burgess 21 May 20247 minsCSO and CISOThreat and Vulnerability ManagementHuman Resources featureAre you a toxic cybersecurity boss? How to be a better CISOBy Christine Wong 18 Apr 20249 minsCSO and CISOHuman ResourcesRisk Management featureTop 6 bad cybersecurity habits of SMBs By Rosalyn Page 15 Apr 202410 minsSmall and Medium BusinessData and Information SecurityRisk Management newsSecurity concerns could be holding back AI projectsBy Shweta Sharma 03 Apr 20244 minsRisk Management Articleshow-toDSPM buyer’s guide: Top 12 data security posture management toolsDSPM tools help security teams to look at the entire data environment and find shadow data, reducing the risk of data lossBy David Strom 02 Apr 2024 14 minsData and Information SecurityRisk ManagementEnterprise Buyer’s GuidesopinionRisky business: 6 steps to assessing cyber risk for the enterpriseRisk is an unavoidable consequence of doing business in the digital age. These six steps for creating a risk assessment plan can help anticipate the danger.By Steve Durbin 27 Mar 2024 6 minsBusinessBusiness IT AlignmentRisk ManagementnewsOrca to offer armor against AI adoption risksThe company's new AI-security posture management (AI-SPM) offering is designed to secure an organization’s AI projects from sensitive access risks.By Shweta Sharma 19 Mar 2024 4 minsRisk ManagementSecurity Softwarefeature4 tabletop exercises every security team should runEvery organization should run tabletop exercises that answer key questions about their preparedness for ransomware and DDoS attacks, third-party risks, and insider threats. By Stephen Lawton 06 Mar 2024 10 minsDDoSRansomwareSupply ChainfeatureWhy governance, risk, and compliance must be integrated with cybersecurityWith pressure from regulators, evolving threats and the need for stronger oversight, integrating cybersecurity risks into GRC programs requires alignment between both areas.By Rosalyn Page 29 Feb 2024 10 minsComplianceRisk ManagementopinionA changing world requires CISOs to rethink cyber preparednessCISOs should consider a more values-oriented, socially informed approach to cyber risk as global conflict grows and many governments could change in key elections.By Christopher Whyte 13 Feb 2024 12 minsCSO and CISOCritical InfrastructureRisk Managementfeature6 best practices for third-party risk managementWith the proliferation of external products such as cloud storage, software as a service, and AI-driven security platforms, managing the risk inherent in using third-party providers has never been more important.By Mary K. Pratt 07 Feb 2024 11 minsThreat and Vulnerability ManagementBusiness IT AlignmentData and Information SecuritynewsNew Israeli startup to help organizations deal with GenAI-related risksThe SaaS offering is specifically targeted at providing organizations visibility and protection over third-party and homegrown generative AI tools.By Shweta Sharma 31 Jan 2024 4 minsRisk Managementnews analysisTime running out to patch Jenkins CI/CD server vulnerabilityThreat actors are already scanning the internet for vulnerable Jenkins servers after a proof of concept was published.By Lucian Constantin 30 Jan 2024 4 minsNetwork SecurityRisk ManagementVulnerabilitiesfeatureTop 4 LLM threats to the enterprisePrompt injection, prompt extraction, new phishing schemes, and poisoned models are the most likely risks organizations face when using large language models.By Deb Radcliff 22 Jan 2024 8 minsPhishingGenerative AIRisk ManagementfeatureNew risk management framework helps with SEC mandate complianceThe authors of the new Cyber Risk Management Program framework explain how it can set an organization up to better comply with SEC and other disclosure and reporting regulations.By Brian Allen and Brandon Bapst 04 Jan 2024 10 minsRegulationComplianceRisk ManagementopinionHow the new Instegogram threat creates liability for organizationsOrganizations might be at risk of liability for images containing malicious code they post on social media even if they were unaware of it.By Daniel B. Garrie, Jennifer Deutsch and Peter Halprin 26 Dec 2023 4 minsThreat and Vulnerability ManagementLegalRisk Management Show more Show less View all Resources whitepaper Global CIO AI Indicator Report: Leading Your Organization into the AI-Enabled Future In times of change, great possibilities often come with great pressures. Nowhere is this truer than in the office of the CIO with the progression of AI and machine learning (ML). The post Global CIO AI Indicator Report: Leading Your Organization into the AI-Enabled Future appeared first on Whitepaper Repository –. By Workday Inc. 24 Jun 2024Artificial IntelligenceBusiness OperationsMachine Learning whitepaper AI Transformation: The role of the CIO across the C-Suite in the next phase of the digital business era By Workday Inc. 24 Jun 2024Artificial IntelligenceBusiness OperationsDigital Transformation whitepaper The Business Value of Workday By Workday Inc. 24 Jun 2024Business OperationsCloud ArchitectureCloud Management View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsSupply ChainRisk ManagementSecurity Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsRisk ManagementIT LeadershipSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news TeamViewer targeted by APT29 hackers, containment measures in place By gyana_swain 28 Jun 20243 mins CyberattacksRemote Access Security feature Top 12 cloud security certifications By Eric Frank 28 Jun 202414 mins CertificationsIT SkillsCloud Security feature The CSO guide to top security conferences By CSO Staff 28 Jun 202410 mins Technology IndustryIT SkillsEvents podcast CSO Executive Sessions India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO podcast CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO podcast CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO video CSO Executive Session India with Hilal Lone, CISO, Razorpay 11 Jun 202429 mins CSO and CISO video CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 202417 mins CSO and CISO video CSO Executive Sessions India with Pradipta Kumar Patro, Global CISO and Head IT Platform, KEC International 22 May 202426 mins CSO and CISO