Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
How organizations can secure their AI code – Source: www.csoonline.com
Source: www.csoonline.com - Author: AI-generated code is surfacing everywhere, even in places where its use is...
CSO - Online
Midsize firms universally behind in slog toward DORA compliance – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis20 Jan 20254 minsComplianceFinancial Services IndustryRegulation The deadline for implementing the...
CSO - Online
Diese Security-Technologien haben ausgedient – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die Cybersicherheit entwickelt sich rasant weiter – insbesondere im KI-Zeitalter. Lesen Sie,...
CSO - Online
Secure AI? Dream on, says AI red team – Source: www.infoworld.com
Source: www.infoworld.com - Author: Microsoft’s ethical AI hackers provide some answers — as well as more...
CSO - Online
US hits back against China’s Salt Typhoon group – Source: www.csoonline.com
Source: www.csoonline.com - Author: Experts welcome economic sanctions against gang believed to be behind telecom hacks,...
CSO - Online
DORA-Umsetzung hält Banken-CISOs auf Trab – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die Frist für die Umsetzung der EU-Verordnung DORA ist abgelaufen. Doch wie...
CSO - Online
Poor patching regime is opening businesses to serious problems – Source: www.csoonline.com
Source: www.csoonline.com - Author: About 70% of organizations did not regularly patch flaws in their internet-facing...
CSO - Online
EU’s DORA could further strain cybersecurity skills gap – Source: www.csoonline.com
Source: www.csoonline.com - Author: As the EU’s Digital Operational Resilience Act comes into force, financial sector...
CSO - Online
Was ist ein Payload? – Source: www.csoonline.com
Source: www.csoonline.com - Author: Kein Cyberangriff ohne Payload. Doch was genau meint der Begriff, welche Arten...
CSO - Online
Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say researchers – Source: www.csoonline.com
Source: www.csoonline.com - Author: The solution: Use IPsec and similar security protocols to protect against exploitation...
CSO - Online
How do you unlock automation within IT security and IT operations? – Source: www.csoonline.com
Source: www.csoonline.com - Author: IT ops and security teams are overwhelmed by spiraling complexity, falling further...
CSO - Online
Biden White House goes all out in final, sweeping cybersecurity order – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis16 Jan 20258 minsData and Information SecurityGovernmentSecurity Practices The ambitious final...
CSO - Online
International agierende Internetbetrüger geschnappt – Source: www.csoonline.com
Source: www.csoonline.com - Author: Phishing, Betrug beim Online-Handel und mit Immobilien-Anzeigen - internationale Ermittler werfen einer...
CSO - Online
Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die EU-Kommission will den Gesundheitsbereich besser vor Cyberangriffen schützen. Dazu sind zahlreiche...
CSO - Online
FTC orders GoDaddy to fix its infosec practices – Source: www.csoonline.com
Source: www.csoonline.com - Author: Despite its size and complexity, FTC complained that the company had failed...
CSO - Online
Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed – Source: www.csoonline.com
Source: www.csoonline.com - Author: A process that should be about the excitement of career development or...
CSO - Online
SIEM buyer’s guide: Top 15 security information and event management tools — and how to choose – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security information and event management tools are a core part of most...
CSO - Online
CISA warns second BeyondTrust vulnerability also exploited in the wild – Source: www.csoonline.com
Source: www.csoonline.com - Author: The US cybersecurity agency added another BeyondTrust vulnerability to its known exploited...
CSO - Online
Die Top 10 Geschäftsrisiken in Deutschland 2025 – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die Welt ist unruhig geworden. Dementsprechend wachsen auch in den Unternehmen die...
CSO - Online
Perfide Ransomware-Attacke gegen AWS-Nutzer – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security-Forscher warnen vor einem Ransomware-Angriff, der auf AWS-Kunden abzielt. Bei Erfolg droht...
CSO - Online
Cisco’s homegrown AI to help enterprises navigate AI adoption – Source: www.csoonline.com
Source: www.csoonline.com - Author: Cisco AI Defense is the company’s proprietary AI tool that can validate...
CSO - Online
CISA unveils ‘Secure by Demand’ guidelines to bolster OT security – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISA and global cybersecurity leaders have introduced a proactive framework for OT...
CSO - Online
The CFO may be the CISO’s most important business ally – Source: www.csoonline.com
Source: www.csoonline.com - Author: Opinion15 Jan 20256 minsBudgetBusiness IT AlignmentCSO and CISO Despite natural tensions, a...
CSO - Online
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid – Source: www.csoonline.com
Source: www.csoonline.com - Author: To prevent overspending in the wrong areas of cybersecurity and support ROI,...
CSO - Online
International effort erases PlugX malware from thousands of Windows computers – Source: www.csoonline.com
Source: www.csoonline.com - Author: Solution from French authorities took advantage of self-delete command; US got a...
CSO - Online
Fortinet confirms zero-day flaw used in attacks against its firewalls – Source: www.csoonline.com
Source: www.csoonline.com - Author: The advisory from the cybersecurity company follows a report from security researchers...
CSO - Online
Beware cybersecurity tech that’s past its prime — 5 areas to check or retire – Source: www.csoonline.com
Source: www.csoonline.com - Author: Feature14 Jan 20257 minsCSO and CISOSecurity HardwareSecurity Practices Cybersecurity products are evolving...
CSO - Online
Biden White House to go all out in final, sweeping cybersecurity order – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis14 Jan 20258 minsData and Information SecurityGovernmentSecurity Practices The ambitious final...
CSO - Online
Phishing-Klickrate massiv gestiegen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine neue Studie zeigt: Trotz Schulungen klickten 2024 dreimal so viele Mitarbeiter...
CSO - Online
Gen AI strategies put CISOs in a stressful bind – Source: www.csoonline.com
Source: www.csoonline.com - Author: Executives are aggressively pressing for all manner of gen AI deployments and...
Posts navigation
1
2
…
21
Latest News
The Register Security
FCC to telcos: By law you must secure your networks from foreign spies. Get on it – Source: go.theregister.com
18/01/2025
The Register Security
Biden signs sweeping cybersecurity order, just in time for Trump to gut it – Source: go.theregister.com
18/01/2025
The Register Security
Fortinet: FortiGate config leaks are genuine but misleading – Source: go.theregister.com
18/01/2025
The Register Security
Clock ticking for TikTok as US Supreme Court upholds ban – Source: go.theregister.com
18/01/2025
The Register Security
Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day – Source: go.theregister.com
18/01/2025
The Register Security
Medusa ransomware group claims attack on UK’s Gateshead Council – Source: go.theregister.com
18/01/2025