www.csoonline.com
Open in
urlscan Pro
151.101.194.165
Public Scan
Submitted URL: http://csoonline.com/
Effective URL: https://www.csoonline.com/
Submission: On October 09 via manual from AU — Scanned from AU
Effective URL: https://www.csoonline.com/
Submission: On October 09 via manual from AU — Scanned from AU
Form analysis
1 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;" dir="ltr" spellcheck="false"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
* Topics * Events * Newsletters * Resources * Community ABOUT * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters POLICIES * Privacy Policy * Cookie Policy * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights OUR NETWORK * CIO * Computerworld * Infoworld * Network World MORE * Awards * Blogs * Brandposts * Events * Podcasts * Videos Close * Generative AI * Business Operations * Careers * Industry * IT Leadership * Compliance * Security * Application Security * Business Continuity * Cloud Security * Critical Infrastructure * Cybercrime * Identity and Access Management * Network Security * Physical Security * Privacy * Risk Management * Security Infrastructure * Vulnerabilities * Software Development Back Close AMERICAS * United States ASIA * ASEAN * India EUROPE * United Kingdom OCEANIA * Australia Back Close × search Popular Topics * Search * US-EN * Topics * Events * Newsletters * Resources * Community * About * Policies * Our Network * More Back TOPICS * Generative AI * Business Operations * Careers * Industry * IT Leadership * Compliance * Security * Application Security * Business Continuity * Cloud Security * Critical Infrastructure * Cybercrime * Identity and Access Management * Network Security * Physical Security * Privacy * Risk Management * Security Infrastructure * Vulnerabilities * Software Development Back ABOUT * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters Back POLICIES * Privacy Policy * Cookie Policy * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights Back OUR NETWORK * CIO * Computerworld * Infoworld * Network World Back MORE * Awards * Blogs * Brandposts * Events * Podcasts * Videos LATEST FROM TODAY news MGM RANSOMWARE ATTACK COSTS $100 MILLION, IN BUSY MONTH FOR BREACHES MGM said cyberinsurance will cover the $100 million impact on operations, but meanwhile experts expect the ransomware trend to continue, fueled by nation-state actors. By Shweta Sharma Oct 06, 20234 mins RansomwareMalwareCybercrime feature THE CSO GUIDE TO TOP SECURITY CONFERENCES By CSO Staff Oct 06, 202313 mins Technology IndustryIT SkillsEvents news QAKBOT MALWARE’S CREATORS RIDE AGAIN, DESPITE FBI TAKEDOWN By Jon Gold Oct 05, 20233 mins RansomwareMalware news analysis CISCO FIXES SERIOUS FLAWS IN EMERGENCY RESPONDER AND OTHER PRODUCTS By Lucian Constantin Oct 05, 20233 mins Critical InfrastructureNetwork SecurityVulnerabilities news GOOGLE, YAHOO ANNOUNCE NEW EMAIL AUTHENTICATION REQUIREMENTS FOR 2024 By Michael Hill Oct 05, 20233 mins AuthenticationEmail Security news analysis WHY OPEN-SOURCE SOFTWARE SUPPLY CHAIN ATTACKS HAVE TRIPLED IN A YEAR By Lucian Constantin Oct 05, 20236 mins CyberattacksMalwareOpen Source news ORGANIZATIONS GRAPPLE WITH DETECTION AND RESPONSE DESPITE RISING SECURITY BUDGETS By Shweta Sharma Oct 05, 20234 mins Security Practices feature COMING FROM INSIDE THE BUILDING: DARK WEB RECRUITMENT OF MALICIOUS INSIDERS By Dov Lerner Oct 05, 202317 mins Cybercrime news OKTA LAUNCHES CYBERSECURITY WORKFORCE DEVELOPMENT INITIATIVE By Michael Hill Oct 04, 20233 mins IT SkillsCareersSecurity EXPLORE A TOPIC * Generative AI * Application Security * Business Continuity * Business Operations * Careers * Cloud Security * Compliance * Critical Infrastructure * Cybercrime * Identity and Access Management * Industry * IT Leadership * Network Security * Physical Security * Privacy * View all topics ALL TOPICS Close * Generative AI * Application Security * Business Continuity * Business Operations * Careers * Cloud Security * Compliance * Critical Infrastructure * Cybercrime * Identity and Access Management * Industry * IT Leadership * Network Security * Physical Security * Privacy * Risk Management * Security * Security Infrastructure * Software Development * Vulnerabilities POPULAR TOPICS GENERATIVE AI feature 10 THINGS YOU SHOULD KNOW ABOUT NAVIGATING THE DARK WEB By Rosalyn Page Oct 02, 2023 13 mins CybercrimeSecurity news SHADOWSYNDICATE CYBERCRIME GANG HAS USED 7 RANSOMWARE FAMILIES OVER THE PAST YEAR By Lucian Constantin Oct 02, 2023 4 mins Hacker GroupsRansomwareCybercrime news UK DATA REGULATOR ORDERS END TO SPREADSHEET FOI REQUESTS AFTER SERIOUS DATA BREACHES By Michael Hill Sep 29, 2023 3 mins GovernmentCybercrimeData and Information Security View topic CYBERCRIME feature CYBERSECURITY STARTUPS TO WATCH FOR IN 2023 By CSO Staff Sep 29, 2023 19 mins CSO and CISOSecurity news analysis COMPANIES ARE ALREADY FEELING THE PRESSURE FROM UPCOMING US SEC CYBER RULES By Cynthia Brumfield Sep 28, 2023 6 mins RegulationData BreachFinancial Services Industry brandpostSponsored by CyberArk 5 WAYS CISOS CAN PREPARE FOR SEC CYBERSECURITY COMPLIANCE By James Imanian Sep 28, 2023 6 mins Security View topic CAREERS news UK DATA REGULATOR WARNS THAT DATA BREACHES PUT ABUSE VICTIMS' LIVES AT RISK By Michael Hill Sep 28, 2023 3 mins Electronic Health RecordsData BreachGovernment brandpostSponsored by CyberArk 5 WORKFORCE TRENDS THAT INTENSIFY INSIDER THREATS By Bryan Murphy Sep 28, 2023 6 mins Security brandpostSponsored by CyberArk CYBERARK GLOBAL CIO ON BALANCING AI OPPORTUNITIES AND RISKS By Omer Grossman Sep 28, 2023 7 mins Security View topic IT LEADERSHIP news ECHOMARK RELEASES WATERMARKING SOLUTION TO SECURE PRIVATE COMMUNICATIONS, DETECT INSIDER THREATS By Michael Hill Sep 28, 2023 4 mins Communications SecurityThreat and Vulnerability ManagementSecurity Software news SPECTEROPS TO USE IN-HOUSE APPROXIMATION TO TEST FOR GLOBAL ATTACK VARIATIONS By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing news NEW TROJAN ZENRAT MASQUERADES AS BITWARDEN PASSWORD MANAGER By Lucian Constantin Sep 28, 2023 4 mins CyberattacksHackingData and Information Security View topic UPCOMING EVENTS 11/Oct virtual summit AI LEADERSHIP SUMMIT: DATA-DRIVEN LEADERSHIP & GENAI Oct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security 08/Nov in-person event FUTUREIT NEW YORK - AI, DATA AND TECH LEADERSHIP: FINDING BUSINESS VALUE FROM EMERGING TECH INNOVATIONS Nov 08, 2023New York, NY Digital TransformationData and Information SecurityIT Leadership 07/Dec virtual summit CSO'S FUTURE OF CYBERSECURITY SUMMIT Dec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events THE CSO COMMUNITY We work to connect the right people and share the right knowledge to help CSOs – and CSOs of the future – get to grips with the many challenges and opportunities they face. Find out more about how we can help you learn from your peers through our various online and offline content offerings. HEAR FROM THE EXPERTS opinion THE CISO'S TOOLKIT MUST INCLUDE POLITICAL CAPITAL WITHIN THE C-SUITE Effective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power. By Christopher Burgess Jun 26, 20235 mins CSO and CISOC-SuiteIT Leadership Read the Article PODCASTS podcasts STRENGTHEN AND STREAMLINE YOUR SECURITY This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity. 4 episodes Data and Information Security * Ep. 03 EPISODE 3: THE ZERO TRUST MODEL Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work * Ep. 04 EPISODE 4: REDUCE SOC BURNOUT Mar 29, 202115 mins CSO and CISOPhishingRemote Work SHOW ME MORE LatestArticlesPodcastsVideos news UK BUSINESSES FACE TIGHTENING CYBERSECURITY BUDGETS AS INCIDENTS SPIKE By Michael Hill Oct 03, 20233 mins CSO and CISORisk Management news CIISEC SECURES GOVERNMENT FUNDING TO EXPAND CYBEREPQ PROGRAM By Michael Hill Oct 03, 20233 mins IT Training CareersSecurity news UK GOVERNMENT PLANS 2,500 NEW TECH RECRUITS BY 2025 WITH FOCUS ON CYBERSECURITY By Michael Hill Sep 29, 20234 mins Education IndustryGovernmentSecurity Practices podcast CSO EXECUTIVE SESSIONS AUSTRALIA WITH NATHAN MORELLI, HEAD OF CYBER SECURITY AND IT RESILIENCE AT SA POWER NETWORKS Oct 02, 202314 mins CSO and CISO podcast CSO EXECUTIVE SESSIONS AUSTRALIA WITH NICOLE NEIL, DIRECTOR OF INFORMATION SECURITY AT SEER MEDICAL Sep 20, 202312 mins CSO and CISO podcast CSO EXECUTIVE SESSIONS AUSTRALIA WITH SIDDIQUA SHAHEEN, HEAD OF CYBER GOVERNANCE AT LANDER & ROGERS Sep 07, 202317 mins CSO and CISO video CSO EXECUTIVE SESSIONS AUSTRALIA WITH NATHAN MORELLI, HEAD OF CYBER SECURITY AND IT RESILIENCE AT SA POWER NETWORKS Oct 02, 202314 mins CSO and CISO video CSO EXECUTIVE SESSIONS AUSTRALIA WITH NICOLE NEIL, DIRECTOR OF INFORMATION SECURITY AT SEER MEDICAL Sep 20, 202312 mins CSO and CISO video WHAT IS ZERO TRUST SECURITY? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security Sponsored Links * Unified identity security is the new imperative. SailPoint has the roadmap for success - Learn more * Accelerate your cloud application security strategy with Panoptica * Tomorrow’s cybersecurity success starts with next-level innovation today. Join the discussion now to sharpen your focus on risk and resilience. About * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters * Brandposts Policies * Privacy Policy * Cookie Policy * Copyright Notice * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights * Privacy Settings Our Network * CIO * Computerworld * Infoworld * Network World * LinkedIn * Twitter * Facebook CSO WANTS TO SHOW YOU NOTIFICATIONS -------------------------------------------------------------------------------- YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER Accept Do not accept POWERED BY SUBSCRIBERS