Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
How to update your Windows driver blocklist to keep malicious drivers away
How to update your Windows driver blocklist to keep malicious drivers away For many years, attackers...
csonline
How Cisco’s Cloud Control Framework helps it comply with multiple security standards
How Cisco’s Cloud Control Framework helps it comply with multiple security standards An XKCD comic strip...
csonline
BrandPost: Top 5 Regulatory Reasons for Implementing Zero Trust
BrandPost: Top 5 Regulatory Reasons for Implementing Zero Trust We are beyond the point of viewing...
csonline
BrandPost: 10 Best Practices for a Zero Trust Data Center
BrandPost: 10 Best Practices for a Zero Trust Data Center Today, there is no such thing...
csonline
Akamai to boost network-layer DDoS protection with new scrubbing centers
Akamai to boost network-layer DDoS protection with new scrubbing centers Content delivery network (CDN) provider Akamai...
csonline
5 ways to grow the cybersecurity workforce
5 ways to grow the cybersecurity workforce The demand for cybersecurity professionals has surged over the...
csonline
Ransomware operators might be dropping file encryption in favor of corrupting files
Ransomware operators might be dropping file encryption in favor of corrupting files Ransomware started out many...
csonline
A third of Australian population likely affected in Optus cyberattack
A third of Australian population likely affected in Optus cyberattack Australia’s second largest telecommunications provider, Optus,...
csonline
SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware
SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware Researchers have discovered...
csonline
CNAPP buyers guide: Top tools compared
CNAPP buyers guide: Top tools compared Cloud security continues to be a vexing situation, and the...
csonline
Q-Scout aims for smartphone security without the intrusiveness
Q-Scout aims for smartphone security without the intrusiveness Mobile security firm Quokka—which earlier this week rebranded...
csonline
Recommended security resources for Microsoft Active Directory
Recommended security resources for Microsoft Active Directory Many firms are still firmly in an Active Directory...
csonline
Iranian cyberspies use multi-persona impersonation in phishing threads
Iranian cyberspies use multi-persona impersonation in phishing threads One of the most prolific state-sponsored Iranian cyber...
csonline
One in 10 employees leaks sensitive company data every 6 months: report
One in 10 employees leaks sensitive company data every 6 months: report Insider threats are an...
csonline
New Sysdig cloud security software prioritizes risk, cuts remediation time
New Sysdig cloud security software prioritizes risk, cuts remediation time Unified container and cloud security firm...
csonline
AutoRabit launches devsecops tool for Salesforce environments
AutoRabit launches devsecops tool for Salesforce environments Devsecops firm AutoRabit is trying to address security issues...
csonline
Cybersecurity startup launches mobile app to protect against phishing attacks
Cybersecurity startup launches mobile app to protect against phishing attacks Cybersecurity startup novoShield has launched an...
csonline
Excess privilege in the cloud is a universal security problem, IBM says
Excess privilege in the cloud is a universal security problem, IBM says Excess privilege granted to...
csonline
Russia’s cyber future connected at the waist to Soviet military industrial complex
Russia’s cyber future connected at the waist to Soviet military industrial complex The Center for European...
csonline
U.S. government issues guidance for developers to secure the software supply chain: Key takeaways
U.S. government issues guidance for developers to secure the software supply chain: Key takeaways Software supply...
csonline
US government indicts Iranian nationals for ransomware and other cybercrimes
US government indicts Iranian nationals for ransomware and other cybercrimes The US Department of Justice (DOJ)...
csonline
Uber responding to “cybersecurity incident” following reports of significant data breach
Uber responding to “cybersecurity incident” following reports of significant data breach Ride-hailing giant Uber has confirmed...
csonline
API security—and even visibility—isn’t getting handled by enterprises
API security—and even visibility—isn’t getting handled by enterprises A report released this week by OpinionMatters and...
csonline
International cooperation is key to fighting threat actors and cybercrime
International cooperation is key to fighting threat actors and cybercrime In this era of cybersecurity, when...
csonline
Collaboration is key to balance customer experience with security, privacy
Collaboration is key to balance customer experience with security, privacy The way Yaron Cohen sees it,...
csonline
A third of enterprises globally don’t prioritize digital trust: ISACA
A third of enterprises globally don’t prioritize digital trust: ISACA Digital trust is crucial for modern...
csonline
Most common SAP vulnerabilities attackers try to exploit
Most common SAP vulnerabilities attackers try to exploit Unpatched vulnerabilities, common misconfigurations and hidden flaws in...
csonline
Uber links cyberattack to LAPSUS$, says sensitive user data remains protected
Uber links cyberattack to LAPSUS$, says sensitive user data remains protected Uber has linked its recent...
csonline
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source security
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source security Palo Alto Networks...
csonline
CrowdStrike adds XDR, other capabilites across 4 key security products
CrowdStrike adds XDR, other capabilites across 4 key security products CrowdStrike on Tuesday announced enhancements to...
Posts navigation
1
…
11
12
13
…
16
Latest News
CSO - Online
US House reportedly bans WhatsApp from staffers’ devices over security concerns – Source: www.computerworld.com
25/06/2025
CSO - Online
Aflac-Datenleck: Versicherungsbranche im Visier von Hackern – Source: www.csoonline.com
25/06/2025
CSO - Online
New ‘Echo Chamber’ attack can trick GPT, Gemini into breaking safety rules – Source: www.csoonline.com
25/06/2025
CSO - Online
The CISO’s 5-step guide to securing AI operations – Source: www.csoonline.com
25/06/2025
CSO - Online
Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard – Source: www.csoonline.com
25/06/2025
The Hacker News
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public – Source:thehackernews.com
24/06/2025