https://www.csoonline.com/ | | No Text |
/it-leadership/ | | Spotlight: Advancing IT Leadership |
https://www.csoonline.com/events/ | | Events |
/newsletters/signup/ | | Newsletters |
https://us.resources.csoonline... | External Subdomain | Resources |
/community/ | | Community |
/about-us/ | | About Us |
https://foundryco.com/our-bran... | External | Advertise |
/contact-us/ | | Contact Us |
https://foundryco.com/work-here/ | External | Foundry Careers |
/contact-us/ | Anchor | Reprints |
/newsletters/signup/ | Text duplicate | Newsletters |
/expert-contributor-network/ | | Contribute to CSO |
https://foundryco.com/terms-of... | External | Terms of Service |
/privacy-policy/ | | Privacy Policy |
/cookie-policy/ | | Cookie Policy |
/member-preferences/ | | Member Preferences |
/about-adchoices/ | | About AdChoices |
/affiliates/ | | E-commerce Links |
/your-california-privacy-rights/ | | Your California Privacy Rights |
https://www.cio.com/ | External Subdomain | CIO |
https://www.computerworld.com/ | External Subdomain | Computerworld |
https://www.infoworld.com/ | External Subdomain | InfoWorld |
https://www.networkworld.com/ | External Subdomain | Network World |
https://www.csoonline.com/awards/ | | Awards |
https://www.csoonline.com/blogs/ | | Blogs |
/brandposts/ | | BrandPosts |
https://www.csoonline.com/events/ | Text duplicate | Events |
/podcasts/ | | Podcasts |
https://www.csoonline.com/videos/ | | Videos |
/enterprise-buyers-guide/ | | Enterprise Buyer’s Guides |
/artificial-intelligence/ | | Artificial Intelligence |
/generative-ai/ | | Generative AI |
/business-operations/ | | Business Operations |
/careers/ | | Careers |
/industry/ | | Industry |
/it-leadership/ | | IT Leadership |
/compliance/ | | Compliance |
/security/ | | Security |
/application-security/ | | Application Security |
/business-continuity/ | | Business Continuity |
/cloud-security/ | | Cloud Security |
/critical-infrastructure/ | | Critical Infrastructure |
/cybercrime/ | | Cybercrime |
/identity-and-access-management/ | | Identity and Access Management |
/it-management/ | | IT Management |
/network-security/ | | Network Security |
/physical-security/ | | Physical Security |
/privacy/ | | Privacy |
/risk-management/ | | Risk Management |
/security-infrastructure/ | | Security Infrastructure |
/vulnerabilities/ | | Vulnerabilities |
/analytics/ | | Analytics |
/software-development/ | | Software Development |
/enterprise-buyers-guide/ | Text duplicate | Enterprise Buyer’s Guides |
https://www.csoonline.com/asean/ | | ASEAN |
https://www.csoonline.com/in/ | | India |
https://www.csoonline.com/de/ | | Deutschland (Germany) |
https://www.csoonline.com/uk/ | | United Kingdom |
https://www.csoonline.com/au/ | | Australia |
/it-leadership/ | Text duplicate | Spotlight: Advancing IT Leadership |
https://www.csoonline.com/events/ | Text duplicate | Events |
/newsletters/signup/ | Text duplicate | Newsletters |
https://us.resources.csoonline... | External Subdomain Text duplicate | Resources |
/community/ | Text duplicate | Community |
/artificial-intelligence/ | Text duplicate | Artificial Intelligence |
/generative-ai/ | Text duplicate | Generative AI |
/business-operations/ | Text duplicate | Business Operations |
/careers/ | Text duplicate | Careers |
/industry/ | Text duplicate | Industry |
/it-leadership/ | Text duplicate | IT Leadership |
/compliance/ | Text duplicate | Compliance |
/security/ | Text duplicate | Security |
/application-security/ | Text duplicate | Application Security |
/business-continuity/ | Text duplicate | Business Continuity |
/cloud-security/ | Text duplicate | Cloud Security |
/critical-infrastructure/ | Text duplicate | Critical Infrastructure |
/cybercrime/ | Text duplicate | Cybercrime |
/identity-and-access-management/ | Text duplicate | Identity and Access Management |
/it-management/ | Text duplicate | IT Management |
/network-security/ | Text duplicate | Network Security |
/physical-security/ | Text duplicate | Physical Security |
/privacy/ | Text duplicate | Privacy |
/risk-management/ | Text duplicate | Risk Management |
/security-infrastructure/ | Text duplicate | Security Infrastructure |
/vulnerabilities/ | Text duplicate | Vulnerabilities |
/analytics/ | Text duplicate | Analytics |
/software-development/ | Text duplicate | Software Development |
/enterprise-buyers-guide/ | Text duplicate | Enterprise Buyer’s Guides |
/about-us/ | Text duplicate | About Us |
https://foundryco.com/our-bran... | External Text duplicate | Advertise |
/contact-us/ | Text duplicate | Contact Us |
https://foundryco.com/work-here/ | External Text duplicate | Foundry Careers |
/contact-us/ | Anchor Text duplicate | Reprints |
/newsletters/signup/ | Text duplicate | Newsletters |
/expert-contributor-network/ | Text duplicate | Contribute to CSO |
https://foundryco.com/terms-of... | External Text duplicate | Terms of Service |
/privacy-policy/ | Text duplicate | Privacy Policy |
/cookie-policy/ | Text duplicate | Cookie Policy |
/member-preferences/ | Text duplicate | Member Preferences |
/about-adchoices/ | Text duplicate | About AdChoices |
/affiliates/ | Text duplicate | E-commerce Links |
/your-california-privacy-rights/ | Text duplicate | Your California Privacy Rights |
https://www.cio.com/ | External Subdomain Text duplicate | CIO |
https://www.computerworld.com/ | External Subdomain Text duplicate | Computerworld |
https://www.infoworld.com/ | External Subdomain Text duplicate | InfoWorld |
https://www.networkworld.com/ | External Subdomain Text duplicate | Network World |
https://www.csoonline.com/awards/ | Text duplicate | Awards |
https://www.csoonline.com/blogs/ | Text duplicate | Blogs |
/brandposts/ | Text duplicate | BrandPosts |
https://www.csoonline.com/events/ | Text duplicate | Events |
/podcasts/ | Text duplicate | Podcasts |
https://www.csoonline.com/videos/ | Text duplicate | Videos |
/enterprise-buyers-guide/ | Text duplicate | Enterprise Buyer’s Guides |
/article/3997388/6-rising-malw... | | Feature 6 rising malware trends every security pro should know From infostealers commoditizing initial access to a more targeted approach to ransomware attac... IMG-ALT Image |
/article/3989855/will-ai-agent... | | Feature Will AI agent-fueled attacks force CISOs to fast-track passwordless projects? By Rosalyn Page May 28, 202511 mins Generative AIIdentity and Access Ma... IMG-ALT Image |
/article/3994369/how-cisos-can... | | Feature How CISOs can defend against Scattered Spider ransomware attacks By Cynthia Brumfield May 27, 202510 mins RansomwareSecurity PracticesSocial Engineer... IMG-ALT Image |
/article/3997051/if-you-use-on... | | News If you use OneDrive to upload files to ChatGPT or Zoom, don’t By Shweta Sharma May 28, 20255 mins SecurityVulnerabilities |
/article/3993713/secure-email-... | | Opinion ‘Secure email’: A losing battle CISOs must give up By Keith Lawson May 28, 20257 mins Email SecurityEncryption |
/article/3996192/new-russian-a... | | News New Russian APT group Void Blizzard targets NATO-based orgs after infiltrating Dutch police By Lucian Constantin May 27, 20256 mins Advanced Persistent ... |
/article/3995036/breaking-rsa-... | | News Breaking RSA encryption just got 20x easier for quantum computers By Mastufa Ahmed May 26, 20254 mins EncryptionSecurity |
/article/3988368/top-12-us-cit... | | Feature Top 12 US cities for cybersecurity job and salary growth By Eric Frank May 22, 202517 mins CareersIT JobsSalaries |
/article/3988355/8-security-ri... | | Feature 8 security risks overlooked in the rush to implement AI By John Leyden May 19, 20257 mins Application SecurityData and Information SecurityRisk Manag... |
/article/3997480/even-5m-a-yea... | | news Even $5M a year can’t keep top CISOs happy Many CISOs in large enterprises are unhappy with both their compensation and the resources they’re given to s... |
/article/3997999/microsoft-ent... | | news Microsoft Entra’s billing roles pose privilege escalation risks in Azure Guest users with certain billing roles can create and own subscriptions, potent... |
/article/3997429/risk-assessme... | | news Most LLMs don't pass the security sniff test CISOs are advised to apply the same evaluation discipline to AI as they do to any other app in the enterpri... |
/article/3995813/hackers-drop-... | | news Hackers drop 60 npm bombs in less than two weeks to recon dev machines All malicious npm packages carried identical payloads for snooping sensitive netw... |
/article/3994999/cisa-flags-co... | | news CISA flags Commvault zero-day as part of wider SaaS attack campaign Threat actors exploited the Commvault flaw to access M365 secrets, allowing further ... |
https://www.networkworld.com/a... | External Subdomain | news Open MPIC project defends against BGP attacks on certificate validation Open MPIC provides certificate authorities with an open-source framework for imp... |
/article/3992768/the-7-unwritt... | | feature The 7 unwritten rules of leading through crisis Your crisis management playbook may look fail-proof on paper, but leadership and culture offer intang... |
/article/3994124/over-91-of-co... | | news Over 91% of companies sacrifice hybrid cloud security in the AI adoption rush New data shows that a surge in AI and hybrid cloud architectures is creati... |
/article/3994082/beijing-may-h... | | news Beijing may have breached US government systems before Cityworks plugged a critical flaw Talos' research revealed that Chinese hackers are actively expl... |
/article/3992747/critical-infr... | | news analysis Critical infrastructure under attack: Flaws becoming weapon of choice While phishing and stolen credentials remain frequent points of entry, ov... |
/article/3993691/russian-apt28... | | news Russian APT28 compromised Western logistics and IT firms to track aid to Ukraine The Russian GRU-linked cyberespionage group APT28 has been targeting go... |
/article/3993289/feds-and-micr... | | news Feds and Microsoft crush Lumma Stealer that stole millions of passwords Lumma Stealer operation hit 400,000 computers worldwide before coordinated taked... |
/generative-ai/ | Text duplicate | Generative AI |
/application-security/ | Text duplicate | Application Security |
/business-continuity/ | Text duplicate | Business Continuity |
/business-operations/ | Text duplicate | Business Operations |
/careers/ | Text duplicate | Careers |
/cloud-security/ | Text duplicate | Cloud Security |
/compliance/ | Text duplicate | Compliance |
/critical-infrastructure/ | Text duplicate | Critical Infrastructure |
/cybercrime/ | Text duplicate | Cybercrime |
/identity-and-access-management/ | Text duplicate | Identity and Access Management |
/industry/ | Text duplicate | Industry |
/it-leadership/ | Text duplicate | IT Leadership |
/network-security/ | Text duplicate | Network Security |
/physical-security/ | Text duplicate | Physical Security |
/generative-ai/ | Text duplicate | Generative AI |
/application-security/ | Text duplicate | Application Security |
/business-continuity/ | Text duplicate | Business Continuity |
/business-operations/ | Text duplicate | Business Operations |
/careers/ | Text duplicate | Careers |
/cloud-security/ | Text duplicate | Cloud Security |
/compliance/ | Text duplicate | Compliance |
/critical-infrastructure/ | Text duplicate | Critical Infrastructure |
/cybercrime/ | Text duplicate | Cybercrime |
/identity-and-access-management/ | Text duplicate | Identity and Access Management |
/industry/ | Text duplicate | Industry |
/it-leadership/ | Text duplicate | IT Leadership |
/network-security/ | Text duplicate | Network Security |
/physical-security/ | Text duplicate | Physical Security |
/privacy/ | Text duplicate | Privacy |
/risk-management/ | Text duplicate | Risk Management |
/security/ | Text duplicate | Security |
/security-infrastructure/ | Text duplicate | Security Infrastructure |
/software-development/ | Text duplicate | Software Development |
/vulnerabilities/ | Text duplicate | Vulnerabilities |
/it-leadership/ | Text duplicate | Spotlight: Advancing IT Leadership |
/it-leadership/ | | View all |
/it-leadership/ | | No Text |
/article/3992845/prompt-inject... | | news analysis Prompt injection flaws in GitLab Duo highlights risks in AI assistants By Lucian Constantin May 22, 2025 5 mins Code EditorsGenerative AISecurity IMG-ALT Image |
/article/3966034/ai-in-inciden... | | news AI in incident response: from smoke alarms to predictive intelligence By Shweta Sharma Apr 21, 2025 5 mins Generative AIIncident ResponseSecurity |
/article/3958818/two-ways-ai-h... | | feature Two ways AI hype is worsening the cybersecurity skills crisis By Aimee Chanthadavong Apr 21, 2025 9 mins Artificial IntelligenceCareersGenerative AI |
/generative-ai/ | New window | View topic |
/article/3991070/poor-dns-hygi... | | news Poor DNS hygiene is leading to domain hijacking By Howard Solomon May 20, 2025 7 mins CybercrimeMalwareSecurity IMG-ALT Image |
/article/3990385/youve-already... | | brandpostSponsored by Action 1 You’ve already been targeted: Why patch management is mission-critical May 20, 2025 4 mins CyberattacksCybercrimeEndpoint Prot... |
/article/509643/how-to-hack-a-... | | how-to How phones get hacked: 7 common attack methods explained By Josh Fruhlinger May 15, 2025 15 mins DLP SoftwareIdentity Management SolutionsiPhone |
/cybercrime/ | Text duplicate | View topic |
/article/3988361/4-ways-to-saf... | | feature 4 ways to safeguard CISO communications from legal liabilities By Cynthia Brumfield May 20, 2025 9 mins CSO and CISOLegalRegulation IMG-ALT Image |
/article/3977845/the-rise-of-v... | | feature The rise of vCISO as a viable cybersecurity career path By Ericka Chickowski May 12, 2025 16 mins CSO and CISOCareersIT Leadership |
/article/3981182/crowdstrike-c... | | news CrowdStrike cuts 500 jobs in AI pivot, but flags risks By Mastufa Ahmed May 8, 2025 4 mins Artificial IntelligenceCareersIT Jobs |
/careers/ | Text duplicate | View topic |
/article/3980419/india-pakista... | | opinion India-Pakistan conflict underscores your C-suite’s need to prepare for war By Christopher Burgess May 8, 2025 7 mins Business ContinuityIT Leadership... IMG-ALT Image |
https://us.resources.csoonline... | External Subdomain | feature Download the ‘AI-Savvy IT Leadership Strategies’ Enterprise Spotlight By CIO staff May 1, 2025 1 min IT LeadershipIT Strategy |
/article/3964405/reporting-lin... | | feature Reporting lines: Could separating from IT help CISOs? By Rosalyn Page Apr 28, 2025 8 mins CSO and CISOIT LeadershipSecurity |
/it-leadership/ | Text duplicate | View topic |
/article/2071601/who-owns-your... | | Feature Who owns your data? SaaS contract security, privacy red flags Companies looking to use SaaS solutions should involve the security team in the procure... |
/article/2071601/who-owns-your... | | Read the Article |
/podcasts/strengthen-streamlin... | | podcastsSponsored by Microsoft Security Strengthen and Streamline Your Security This podcast series brought to you by Microsoft and IDG, will explore the cor... IMG-ALT Image |
/podcast/508641/episode-3-the-... | | Ep. 03 Episode 3: The Zero Trust Model Jun 28, 202315 mins CSO and CISOMultifactor AuthenticationRemote Work |
/podcast/508640/episode-4-redu... | | Ep. 04 Episode 4: Reduce SOC burnout Jun 28, 202315 mins CSO and CISOPhishingRemote Work |
https://event.ciofutureit.com/... | External Subdomain | 25/Jun in-person event FutureIT Dallas Jun 25, 2025Union Station Application SecurityArtificial IntelligenceEvents IMG-ALT Image |
https://event.ciofutureit.com/... | External Subdomain | 17/Jul in-person event FutureIT New York Jul 17, 2025Convene-New York, NY Data and Information SecurityEvents IMG-ALT Image |
https://event.foundryco.com/ci... | External Subdomain | 11/Aug-13/Aug in-person event CIO 100 Symposium & Awards Aug 11, 2025Fairmont Princess, Scottsdale AZ Business ContinuityEventsIT Leadership IMG-ALT Image |
https://www.csoonline.com/events/ | | View all events |
/article/3997273/separating-hy... | | brandpost Sponsored by Fortinet Separating hype from reality: How cybercriminals are actually using AI By Derek Manky, Chief Security Strategist and Global V... IMG-ALT Image |
/article/3996055/code-security... | | brandpost Sponsored by Black Duck Software, Inc. Code security in the AI era: Balancing speed and safety under new EU regulations By Jeff Miller May 27, 2025... IMG-ALT Image |
/article/3993262/samlify-bug-l... | | news Samlify bug lets attackers bypass single sign-on By Shweta Sharma May 22, 20253 mins Identity and Access ManagementSecurityVulnerabilities IMG-ALT Image |
/podcast/3849977/cso-executive... | | podcast CSO Executive Sessions: How AI and LLMs are affecting security in the financial services industry Mar 20, 202513 mins CSO and CISOFinancial Services ... IMG-ALT Image |
/podcast/3823540/cso-executive... | | podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers Feb 12, 202527 mins Security IMG-ALT Image |
/podcast/3484298/cso-executive... | | podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe Aug 7, 202417 mins CSO and CISO IMG-ALT Image |
/video/3958918/standard-charte... | | video Standard Chartered’s Alvaro Garrido on AI threats and what CIOs/CISOs must know in their AI journey Apr 10, 202514 mins CIOCSO and CISOFinancial Servic... IMG-ALT Image |
/video/3849967/cso-executive-s... | | video CSO Executive Sessions: How AI and LLMs are affecting security in the financial services industry Mar 20, 202513 mins CSO and CISOFinancial Services In... IMG-ALT Image |
/video/3823524/cso-executive-s... | | video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers Feb 12, 202527 mins Security IMG-ALT Image |
http://pubads.g.doubleclick.ne... | External Subdomain | Secure AI by Design: Unleash the power of AI and keep applications, usage and data secure. |
/about-us/ | Text duplicate | About Us |
https://foundryco.com/our-bran... | External Text duplicate | Advertise |
/contact-us/ | Text duplicate | Contact Us |
https://foundryco.com/work-here/ | External Text duplicate | Foundry Careers |
/contact-us/ | Anchor Text duplicate | Reprints |
/newsletters/signup/ | Text duplicate | Newsletters |
/brandposts/ | Text duplicate | BrandPosts |
https://foundryco.com/terms-of... | External Text duplicate | Terms of Service |
/privacy-policy/ | Text duplicate | Privacy Policy |
/cookie-policy/ | Text duplicate | Cookie Policy |
https://foundryco.com/copyrigh... | External | Copyright Notice |
/member-preferences/ | Text duplicate | Member Preferences |
/about-adchoices/ | Text duplicate | About AdChoices |
/affiliates/ | Text duplicate | E-commerce Links |
/your-california-privacy-rights/ | Text duplicate | Your California Privacy Rights |
https://www.cio.com/ | New window External Subdomain Text duplicate | CIO |
https://www.computerworld.com/ | New window External Subdomain Text duplicate | Computerworld |
https://www.infoworld.com/ | New window External Subdomain | Infoworld |
https://www.networkworld.com/ | New window External Subdomain Text duplicate | Network World |
https://foundryco.com/ | New window External | No Text |
https://www.facebook.com/CSOon... | New window External Subdomain | Facebook |
https://twitter.com/CSOonline | New window External | X |
https://www.youtube.com/@csoon... | New window External Subdomain | YouTube |
https://news.google.com/public... | New window External Subdomain | Google News |
https://www.linkedin.com/compa... | New window External Subdomain | LinkedIn |
https://foundryco.com/terms-of... | New window External | © 2025 IDG Communications, Inc. All Rights Reserved. |
(Nice to have)