newsTop cybersecurity product news of the weekNew product and service announcements from Forcepoint, Ionix, Amplifier Secutiry and Torq.By CSO staffApr 26, 202481 minsGenerative AISecurity feature Looking outside: How to protect against non-Windows network vulnerabilitiesBy Susan BradleyApr 25, 20247 minsWindows SecurityNetwork SecuritySecurity PracticesbrandpostSponsored by Microsoft Security What will cyber threats look like in 2024?By Microsoft SecurityApr 24, 20245 minsSecurity brandpostSponsored by SynopsysDevSecOps: Still a challenge but more achievable than everBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Apr 22, 20246 minsSecurity brandpostSponsored by PwCImproved incident response planning is a business necessityBy Elliot Markowitz Apr 19, 20244 minsSecurity feature10 tips to keep IP safeBy Derek Slater and Alyson Behr Apr 16, 202418 minsIntellectual PropertyDLP SoftwareData and Information Security news analysisUS supreme court ruling suggests change in cybersecurity disclosure processBy Evan Schuman Apr 16, 20246 minsRegulationSecurity featureMicrosoft-blasting CSRB report offers roadmap for better cloud securityBy Cynthia Brumfield Apr 10, 20249 minsCloud SecurityData and Information SecuritySecurity Practices newsBoys’ club mentality still a barrier to women’s success in cybersecurity careersBy John Leyden Apr 10, 20245 minsCareersSecurity ArticlesfeatureGeneral Data Protection Regulation (GDPR): What you need to know to stay compliantGDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs to know about GDPR.By Michael Nadeau Apr 04, 2024 21 minsComplianceData and Information SecurityPrivacybrandpostSponsored by FortinetStrengthening cyber resiliency through collaborationBy Suzanne Spaulding, Fortinet Strategic Advisory Council Apr 03, 2024 6 minsSecurityfeaturePCI DSS explained: Requirements, fines, and steps to complianceAnyone who takes credit card payments needs to adhere to PCI DSS—and may face fines if they failBy Josh Fruhlinger Apr 03, 2024 13 minsRegulationPCISecurityfeatureTabletop exercises explained: Definition, examples, and objectivesLess intense than a full-scale simulation, a tabletop exercise is an opportunity to see how your organization and staff will react under pressure.By Josh Fruhlinger Apr 02, 2024 11 minsIT Training Security PracticesSecurityfeatureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff Apr 01, 2024 17 minsTechnology IndustryIT SkillsEventsnewsCisco: Security teams are ‘overconfident’ about handling next-gen threatsTooling complexity and generative AI may harm many companies’ security posture.By Jon Gold Mar 28, 2024 3 minsSecuritybrandpostSponsored by Microsoft SecurityIran’s evolving influence operations and cyberattacks support HamasUnderstanding how Iranian and Iran-affiliated threats traverse 3 distinct phases may help identify vulnerabilities and attack vectors. By Microsoft Security Mar 28, 2024 5 minsSecuritybrandpostSponsored by Palo Alto NetworksA Zero Trust approach for remote access in utilities is essentialInfrastructure, specifically the utilities sector, must adopt a Zero Trust approach as ongoing cyberattacks by remote actors become more and more prevalent—threatening to disrupt everyday life. By Anand Oswal, senior vice president of product, network security, Palo Alto Networks Mar 28, 2024 5 minsSecuritybrandpostSponsored by Microsoft SecurityWant to build impact as a CISO? Choose CNAPP as your solutionLearn how CISOs can advance and drive a more secure cloud state in 2024 and beyond. By Yuri Diogenes Mar 26, 2024 4 minsSecuritybrandpostSponsored by Microsoft SecurityAdapting to a new era of cybersecurity in the age of AICybersecurity is undergoing a massive transformation, and AI is at the forefront of that change.By Microsoft Security Mar 26, 2024 4 minsSecuritybrandpostSponsored by Palo Alto NetworksWhat vulnerabilities are obscured by your cloud environments?Organizations look to AI and automation to regain control of their cloud security posture. By Pete Bartolik Mar 26, 2024 4 minsSecuritybrandpostSponsored by FortinetAddressing cyber challenges through public-private partnershipsFortinet’s Jim Richberg stood before the U.S. House Committee on Energy and Commerce and discussed how public-private partnerships can strengthen cybersecurity. By Jim Richberg Mar 19, 2024 6 minsSecurity Show more Show less View all Upcoming Events21/Oct-23/Oct awards CSO50 Conference + AwardsOct 21, 2024Phoenix, AZ CSO and CISOCybercrimeSecurity View all events Resources whitepaper Security for Retrieval Augmented Generation (RAG) Applications Retrieval-augmented generation (RAG) is one of the most common methods for improving the contextual relevance of an LLM by connecting additional knowledge sources. The post Security for Retrieval Augmented Generation (RAG) Applications appeared first on Whitepaper Repository –. By Robust Intelligence, Inc 16 Apr 2024Artificial IntelligenceMachine LearningSecurity whitepaper Security for AI Chatbots and AI Agents By Robust Intelligence, Inc 12 Apr 2024Artificial IntelligenceMachine LearningSecurity whitepaper Closing the security visibility gap By AWS and Kyndryl 12 Apr 2024Business OperationsCloud SecuritySecurity View all Podcasts podcastsSponsored by Microsoft SecurityStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout Mar 29, 202115 mins CSO and CISOPhishingRemote WorkVideo on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. Dec 21, 2021 18 minsRisk ManagementSecurity HP turns to zero trust to defend against emerging threats Nov 05, 2021 25 minsZero TrustHPSecurity Closing the skills gap with smarter cybersecurity hiring and team development Oct 30, 2021 33 minsHiringIT SkillsSecurity Preparing for XDR: What CISOs should be doing now Oct 22, 2021 23 minsThreat and Vulnerability ManagementSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news New CISO appointments 2024 By CSO Staff Apr 26, 202414 mins CSO and CISOIT JobsIT Governance brandpost Sponsored by Palo Alto Networks Cloud security teams: What to know as M&A activity rebounds in 2024 By Amol Mathur, SVP & GM of Prisma Cloud, Palo Alto Networks Apr 25, 20244 mins Cloud Security news Salt Security adds defense against OAuth attacks By Shweta Sharma Apr 25, 20243 mins AuthenticationSecurity Software podcast CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 02, 202416 mins CSO and CISO podcast CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection Feb 20, 202421 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care Apr 01, 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special Mar 13, 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama Mar 05, 202456 mins RansomwareArtificial Intelligence