www.csoonline.com Open in urlscan Pro
151.101.194.165  Public Scan

Submitted URL: http://csoonline.com/
Effective URL: https://www.csoonline.com/
Submission: On October 09 via manual from AU — Scanned from AU

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;" dir="ltr" spellcheck="false"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

 * Topics
 * Events
 * Newsletters
 * Resources
 * Community




ABOUT

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters


POLICIES

 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights


OUR NETWORK

 * CIO
 * Computerworld
 * Infoworld
 * Network World


MORE

 * Awards
 * Blogs
 * Brandposts
 * Events
 * Podcasts
 * Videos

Close
 * Generative AI
 * Business Operations
 * Careers
 * Industry
 * IT Leadership
 * Compliance
 * Security
 * Application Security
 * Business Continuity
 * Cloud Security

 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security Infrastructure
 * Vulnerabilities
 * Software Development

Back
Close


AMERICAS

 * United States


ASIA

 * ASEAN
 * India


EUROPE

 * United Kingdom


OCEANIA

 * Australia

Back
Close
×

search
 

Popular Topics

 * Search
 * US-EN

 * Topics
 * Events
 * Newsletters
 * Resources
 * Community
 * About
 * Policies
 * Our Network
 * More

Back


TOPICS

 * Generative AI
 * Business Operations
 * Careers
 * Industry
 * IT Leadership
 * Compliance
 * Security
 * Application Security
 * Business Continuity
 * Cloud Security
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security Infrastructure
 * Vulnerabilities
 * Software Development

Back


ABOUT

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters

Back


POLICIES

 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights

Back


OUR NETWORK

 * CIO
 * Computerworld
 * Infoworld
 * Network World

Back


MORE

 * Awards
 * Blogs
 * Brandposts
 * Events
 * Podcasts
 * Videos





LATEST FROM TODAY

news


MGM RANSOMWARE ATTACK COSTS $100 MILLION, IN BUSY MONTH FOR BREACHES

MGM said cyberinsurance will cover the $100 million impact on operations, but
meanwhile experts expect the ransomware trend to continue, fueled by
nation-state actors.

By Shweta Sharma
Oct 06, 20234 mins
RansomwareMalwareCybercrime
feature


THE CSO GUIDE TO TOP SECURITY CONFERENCES

By CSO Staff
Oct 06, 202313 mins
Technology IndustryIT SkillsEvents
news


QAKBOT MALWARE’S CREATORS RIDE AGAIN, DESPITE FBI TAKEDOWN

By Jon Gold
Oct 05, 20233 mins
RansomwareMalware
news analysis

CISCO FIXES SERIOUS FLAWS IN EMERGENCY RESPONDER AND OTHER PRODUCTS

By Lucian Constantin
Oct 05, 20233 mins
Critical InfrastructureNetwork SecurityVulnerabilities
news

GOOGLE, YAHOO ANNOUNCE NEW EMAIL AUTHENTICATION REQUIREMENTS FOR 2024

By Michael Hill
Oct 05, 20233 mins
AuthenticationEmail Security
news analysis

WHY OPEN-SOURCE SOFTWARE SUPPLY CHAIN ATTACKS HAVE TRIPLED IN A YEAR

By Lucian Constantin
Oct 05, 20236 mins
CyberattacksMalwareOpen Source
news

ORGANIZATIONS GRAPPLE WITH DETECTION AND RESPONSE DESPITE RISING SECURITY
BUDGETS

By Shweta Sharma
Oct 05, 20234 mins
Security Practices
feature

COMING FROM INSIDE THE BUILDING: DARK WEB RECRUITMENT OF MALICIOUS INSIDERS

By Dov Lerner
Oct 05, 202317 mins
Cybercrime
news

OKTA LAUNCHES CYBERSECURITY WORKFORCE DEVELOPMENT INITIATIVE

By Michael Hill
Oct 04, 20233 mins
IT SkillsCareersSecurity



EXPLORE A TOPIC



 * Generative AI
 * Application Security
 * Business Continuity
 * Business Operations
 * Careers
 * Cloud Security
 * Compliance
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Industry
 * IT Leadership
 * Network Security
 * Physical Security
 * Privacy
 * View all topics


ALL TOPICS

Close
 * Generative AI
 * Application Security
 * Business Continuity
 * Business Operations
 * Careers
 * Cloud Security
 * Compliance
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Industry
 * IT Leadership
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security
 * Security Infrastructure
 * Software Development
 * Vulnerabilities


POPULAR TOPICS


GENERATIVE AI

feature


10 THINGS YOU SHOULD KNOW ABOUT NAVIGATING THE DARK WEB

By Rosalyn Page
Oct 02, 2023 13 mins
CybercrimeSecurity
news

SHADOWSYNDICATE CYBERCRIME GANG HAS USED 7 RANSOMWARE FAMILIES OVER THE PAST
YEAR

By Lucian Constantin
Oct 02, 2023 4 mins
Hacker GroupsRansomwareCybercrime
news

UK DATA REGULATOR ORDERS END TO SPREADSHEET FOI REQUESTS AFTER SERIOUS DATA
BREACHES

By Michael Hill
Sep 29, 2023 3 mins
GovernmentCybercrimeData and Information Security
View topic


CYBERCRIME

feature


CYBERSECURITY STARTUPS TO WATCH FOR IN 2023

By CSO Staff
Sep 29, 2023 19 mins
CSO and CISOSecurity
news analysis

COMPANIES ARE ALREADY FEELING THE PRESSURE FROM UPCOMING US SEC CYBER RULES

By Cynthia Brumfield
Sep 28, 2023 6 mins
RegulationData BreachFinancial Services Industry
brandpostSponsored by CyberArk

5 WAYS CISOS CAN PREPARE FOR SEC CYBERSECURITY COMPLIANCE

By James Imanian
Sep 28, 2023 6 mins
Security
View topic


CAREERS

news


UK DATA REGULATOR WARNS THAT DATA BREACHES PUT ABUSE VICTIMS' LIVES AT RISK

By Michael Hill
Sep 28, 2023 3 mins
Electronic Health RecordsData BreachGovernment
brandpostSponsored by CyberArk

5 WORKFORCE TRENDS THAT INTENSIFY INSIDER THREATS

By Bryan Murphy
Sep 28, 2023 6 mins
Security
brandpostSponsored by CyberArk

CYBERARK GLOBAL CIO ON BALANCING AI OPPORTUNITIES AND RISKS

By Omer Grossman
Sep 28, 2023 7 mins
Security
View topic


IT LEADERSHIP

news


ECHOMARK RELEASES WATERMARKING SOLUTION TO SECURE PRIVATE COMMUNICATIONS, DETECT
INSIDER THREATS

By Michael Hill
Sep 28, 2023 4 mins
Communications SecurityThreat and Vulnerability ManagementSecurity Software
news

SPECTEROPS TO USE IN-HOUSE APPROXIMATION TO TEST FOR GLOBAL ATTACK VARIATIONS

By Shweta Sharma
Sep 28, 2023 3 mins
Penetration Testing
news

NEW TROJAN ZENRAT MASQUERADES AS BITWARDEN PASSWORD MANAGER

By Lucian Constantin
Sep 28, 2023 4 mins
CyberattacksHackingData and Information Security
View topic



UPCOMING EVENTS

11/Oct

virtual summit

AI LEADERSHIP SUMMIT: DATA-DRIVEN LEADERSHIP & GENAI

Oct 11, 2023Virtual
Employee ProtectionCloud SecurityData and Information Security
08/Nov

in-person event

FUTUREIT NEW YORK - AI, DATA AND TECH LEADERSHIP: FINDING BUSINESS VALUE FROM
EMERGING TECH INNOVATIONS

Nov 08, 2023New York, NY
Digital TransformationData and Information SecurityIT Leadership
07/Dec

virtual summit

CSO'S FUTURE OF CYBERSECURITY SUMMIT

Dec 07, 2023Virtual
CSO and CISOCyberattacksSecurity
View all events


THE CSO COMMUNITY


We work to connect the right people and share the right knowledge to help CSOs –
and CSOs of the future – get to grips with the many challenges and opportunities
they face. Find out more about how we can help you learn from your peers through
our various online and offline content offerings.




HEAR FROM THE EXPERTS

opinion

THE CISO'S TOOLKIT MUST INCLUDE POLITICAL CAPITAL WITHIN THE C-SUITE

Effective CISOs need to clearly articulate risk and mitigation strategies in
business. They must be clear, precise, and, above all, speak truth to power.

By Christopher Burgess
Jun 26, 20235 mins
CSO and CISOC-SuiteIT Leadership
Read the Article




PODCASTS

podcasts

STRENGTHEN AND STREAMLINE YOUR SECURITY

This podcast series brought to you by Microsoft and IDG, will explore the core
components of a modern security strategy, with insights and tips from leading
security experts. We'll discuss how ongoing and ever-changing threats, a growing
security stack, and a shift to remote work make it difficult for CISOs and their
security teams to balance enterprise-grade security with end-user productivity.

4 episodes
Data and Information Security
 * Ep. 03
   
   EPISODE 3: THE ZERO TRUST MODEL
   
   Mar 25, 202115 mins
   Multi-factor AuthenticationCSO and CISORemote Work
 * Ep. 04
   
   EPISODE 4: REDUCE SOC BURNOUT
   
   Mar 29, 202115 mins
   CSO and CISOPhishingRemote Work



SHOW ME MORE

LatestArticlesPodcastsVideos
news

UK BUSINESSES FACE TIGHTENING CYBERSECURITY BUDGETS AS INCIDENTS SPIKE

By Michael Hill
Oct 03, 20233 mins
CSO and CISORisk Management

news

CIISEC SECURES GOVERNMENT FUNDING TO EXPAND CYBEREPQ PROGRAM

By Michael Hill
Oct 03, 20233 mins
IT Training CareersSecurity

news

UK GOVERNMENT PLANS 2,500 NEW TECH RECRUITS BY 2025 WITH FOCUS ON CYBERSECURITY

By Michael Hill
Sep 29, 20234 mins
Education IndustryGovernmentSecurity Practices

podcast

CSO EXECUTIVE SESSIONS AUSTRALIA WITH NATHAN MORELLI, HEAD OF CYBER SECURITY AND
IT RESILIENCE AT SA POWER NETWORKS


Oct 02, 202314 mins
CSO and CISO

podcast

CSO EXECUTIVE SESSIONS AUSTRALIA WITH NICOLE NEIL, DIRECTOR OF INFORMATION
SECURITY AT SEER MEDICAL


Sep 20, 202312 mins
CSO and CISO

podcast

CSO EXECUTIVE SESSIONS AUSTRALIA WITH SIDDIQUA SHAHEEN, HEAD OF CYBER GOVERNANCE
AT LANDER & ROGERS


Sep 07, 202317 mins
CSO and CISO

video

CSO EXECUTIVE SESSIONS AUSTRALIA WITH NATHAN MORELLI, HEAD OF CYBER SECURITY AND
IT RESILIENCE AT SA POWER NETWORKS


Oct 02, 202314 mins
CSO and CISO

video

CSO EXECUTIVE SESSIONS AUSTRALIA WITH NICOLE NEIL, DIRECTOR OF INFORMATION
SECURITY AT SEER MEDICAL


Sep 20, 202312 mins
CSO and CISO

video

WHAT IS ZERO TRUST SECURITY?


Sep 06, 20233 mins
AuthenticationZero TrustNetwork Security


Sponsored Links

 * Unified identity security is the new imperative. SailPoint has the roadmap
   for success - Learn more
 * Accelerate your cloud application security strategy with Panoptica
 * Tomorrow’s cybersecurity success starts with next-level innovation today.
   Join the discussion now to sharpen your focus on risk and resilience.

About

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters
 * Brandposts

Policies

 * Privacy Policy
 * Cookie Policy
 * Copyright Notice
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights
 * Privacy Settings

Our Network

 * CIO
 * Computerworld
 * Infoworld
 * Network World


 * LinkedIn
 * Twitter
 * Facebook













CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS