Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
9 attack surface discovery and management tools
9 attack surface discovery and management tools Cyber asset attack surface management (CAASM) or external attack...
csonline
Developed countries lag emerging markets in cybersecurity readiness
Developed countries lag emerging markets in cybersecurity readiness Organizations in developed countries are not as prepared...
csonline
BrandPost: Stop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the Cloud
BrandPost: Stop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the Cloud Managing multiple...
csonline
As critical Microsoft vulnerabilities drop, attackers may adopt new techniques
As critical Microsoft vulnerabilities drop, attackers may adopt new techniques While the total number of recorded...
csonline
Ping Identity debuts decentralized access management system in early access
Ping Identity debuts decentralized access management system in early access Ping Identity, a Colorado-based IAM software...
csonline
Sharing sensitive business data with ChatGPT could be risky
Sharing sensitive business data with ChatGPT could be risky The furor surrounding ChatGPT remains at a...
csonline
Backslash AppSec solution targets toxic code flows, threat model automation
Backslash AppSec solution targets toxic code flows, threat model automation Backslash Security has announced its launch...
csonline
Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks
Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks The average enterprise storage...
csonline
Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats
Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats The UK and Israeli governments...
csonline
55 zero-day flaws exploited last year show the importance of security risk management
55 zero-day flaws exploited last year show the importance of security risk management Deploying security patches...
csonline
Splunk adds new security and observability features
Splunk adds new security and observability features New security and observability features will be added to...
csonline
How training and recognition can reduce cybersecurity stress and burnout
How training and recognition can reduce cybersecurity stress and burnout Cybersecurity is a demanding profession that...
csonline
New vulnerabilities found in industrial control systems of major vendors
New vulnerabilities found in industrial control systems of major vendors The US Cybersecurity and Infrastructure Security...
csonline
Security at the core of Intel’s new vPro platform
Security at the core of Intel’s new vPro platform Intel has introduced its 13th Generation Core...
csonline
Security Recruiter Directory
Security Recruiter Directory Looking for a qualified candidate or new job? CSO’s security recruiter directory is...
csonline
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises ForegeRock is adding a new passwordless authentication...
csonline
7 guidelines for identifying and mitigating AI-enabled phishing campaigns
7 guidelines for identifying and mitigating AI-enabled phishing campaigns The emergence of effective natural language processing...
csonline
BianLian ransomware group shifts focus to extortion
BianLian ransomware group shifts focus to extortion Ransomware group BianLian has shifted the main focus of...
csonline
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws Last week, the US Cybersecurity...
csonline
Two Patch Tuesday flaws you should fix right now
Two Patch Tuesday flaws you should fix right now Microsoft released its monthly security bulletin this...
csonline
BrandPost: 1Password integrates with Okta SSO
BrandPost: 1Password integrates with Okta SSO Single Sign-On (SSO) providers like Okta protect businesses by combining...
csonline
Russian hacktivist group targets India’s health ministry
Russian hacktivist group targets India’s health ministry A Russian hacktivist group has claimed to have breached...
csonline
Why red team exercises for AI should be on a CISO’s radar
Why red team exercises for AI should be on a CISO’s radar AI and machine learning...
csonline
When and how to report a breach to the SEC
When and how to report a breach to the SEC New cybersecurity reporting requirements for publicly...
csonline
UK bans TikTok on government devices over data security fears
UK bans TikTok on government devices over data security fears Social media app TikTok has been...
csonline
Trustwave teams up with Trellix for better managed security
Trustwave teams up with Trellix for better managed security Managed detection and response (MDR) company Trustwave...
csonline
Palo Alto announces new SD-WAN features for IoT security, compliance support
Palo Alto announces new SD-WAN features for IoT security, compliance support Cybersecurity vendor Palo Alto has...
csonline
Beyond Identity launches Zero Trust Authentication to align verification with zero-trust principles
Beyond Identity launches Zero Trust Authentication to align verification with zero-trust principles Multifactor authentication (MFA) provider...
csonline
Cybercriminals target SVB customers with BEC and cryptocurrency scams
Cybercriminals target SVB customers with BEC and cryptocurrency scams Cybercriminals have started taking advantage of Silicon...
csonline
Dell beefs up security portfolio with new threat detection and recovery tools
Dell beefs up security portfolio with new threat detection and recovery tools Dell Technologies has added...
Posts navigation
1
2
3
…
16
Latest News
The Register Security
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days – Source: go.theregister.com
14/01/2025
The Hacker News
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks – Source:thehackernews.com
14/01/2025
CSO - Online
US attacks ransomware supply chain with indictment of three cryptocurrency mixer operators – Source: www.csoonline.com
13/01/2025
CSO - Online
Sicherheitsmängel gefährden DNA-Sequenziergeräte – Source: www.csoonline.com
13/01/2025
CSO - Online
Biden’s final push: Using AI to bolster cybersecurity standards – Source: www.csoonline.com
13/01/2025
CSO - Online
CISOs embrace rise in prominence — with broader business authority – Source: www.csoonline.com
13/01/2025