Latest from todayFeature6 novel ways to use AI in cybersecurityAI is changing everything, including cybersecurity. Here are six creative AI methods you can use to help protect your enterprise.By John EdwardsSep 23, 20257 minsArtificial IntelligenceSecurity Infrastructure Feature AI is altering entry-level cyber hiring — and the nature of the skills gapBy John LeydenSep 18, 20257 minsHiringIT Skills and TrainingSecurity InfrastructureOpinion Where CISOs need to see Splunk go nextBy Jon OltsikSep 18, 20257 minsNetwork SecuritySecurity InfrastructureTechnology Industry NewsCrowdStrike bets big on agentic AI with new offerings after $290M Onum buyBy Cynthia Brumfield Sep 16, 20258 minsArtificial IntelligenceSecurity InfrastructureTechnology Industry FeatureCISOs grapple with the realities of applying AI to security functionsBy John Leyden Sep 16, 20256 minsArtificial IntelligenceSecurity InfrastructureSecurity Practices OpinionYour SOC is the parachute — Will it open?By Dan Haagman Sep 15, 20255 minsArtificial IntelligenceSecurity InfrastructureSecurity Practices Feature5 trends reshaping IT security strategies todayBy Mary K. Pratt Sep 15, 20259 minsBudgetingIT StrategyRisk Management FeatureHow AI is reshaping cybersecurity operationsBy Mary K. Pratt Aug 25, 202510 minsIT Skills and TrainingIT StrategySecurity Infrastructure FeatureAgentic AI promises a cybersecurity revolution — with asterisksBy Cynthia Brumfield Aug 18, 20259 minsSecurity InfrastructureSecurity PracticesTechnology Industry Articlesanalysis7 reasons the SOC is in crisis — and 5 steps to fix itBreaches continue to happen as SOC analysts deal with too many alerts or rules of engagement that stops them from acting. Here are some of the common problems and how to fix them.By Dan Haagman Aug 14, 2025 11 minsIdentity and Access ManagementSecurity InfrastructureSecurity PracticesnewsReVault flaws let attackers bypass Windows login or place malware implants on Dell laptopsUpdate now: ControlVault3 firmware vulnerabilities undermine secure enclave technology.By John Leyden Aug 6, 2025 5 minsEventsSecurity InfrastructureVulnerabilitiesfeatureHow cybersecurity leaders are securing AI infrastructuresAI models, agentic frameworks, data pipelines, and all the tools, services, and open-source libraries that make AI possible are evolving quickly and cybersecurity leaders must be on top of it.By Maria Korolov Aug 6, 2025 10 minsArtificial IntelligenceGenerative AISecurity InfrastructurefeatureSkills gaps send CISOs in search of managed security providersUse of MSSPs is on the rise as CISOs contend with increased workloads, rising threats, and budget constraints, in addition to talent and training gaps.By John Leyden Jul 7, 2025 7 minsIT Skills and TrainingManaged Service ProvidersOutsourcingbrandpostSponsored by Microsoft SecurityFrom reactive to proactive: Redefining incident response with unified, cloud-native XDR It’s time to empower SOCs with the tools to predict attacks before they occur—stopping threats preemptively is essential in 2025. By Matt Egen, Principal Security Global Black Belt at Microsoft Dec 19, 2024 4 minsSecuritySecurity InfrastructurefeatureDownload the ‘AI-ready data centers’ spotlight reportIn this issue: There are lots of great reasons for running AI applications in your own data centers – provided they’re up to the task. AI puts new demands on virtually every aspect of data centers from servers and networks to power grids and more. Learn what it takes to build and run an AI-ready data center.By CSO Staff Jul 1, 2025 1 minCloud SecurityNetwork SecuritySecurity Infrastructurenews analysisPressure is mounting to cut jobs in favor of AI. Here’s why you shouldn’t.CISOs urged to resist AI job cut pressures and instead seek ways to employ the technology to unleash human creativity and alleviate burnout.By John Leyden Jun 26, 2025 5 minsIT JobsSecurity InfrastructureTechnology IndustryfeatureThe highest-paying jobs in cybersecurity todayAccording to a recent survey by IANS and Artico Search, risk/GRC specialists, along with security architects, analysts, and engineers, report the highest average annual cash compensation in cybersecurity.By Eric Frank Jun 18, 2025 7 minsIT JobsSalariesSecurity Infrastructurenews analysisChinese cyberespionage group deploys custom backdoors on Juniper routersThe threat group UNC3886 uses stolen credentials and custom malware implants to compromise end-of-life routers from Juniper Networks still in use by enterprises and ISPs.By Lucian Constantin Mar 12, 2025 8 minsAdvanced Persistent ThreatsHackingNetwork SecurityfeatureSecurity operations centers are fundamental to cybersecurity — here’s how to build oneTo create an effective SOC, CISOs must balance people, technology, and operations and decide between investing in-house or managed services.By Cynthia Brumfield Mar 11, 2025 10 minsCSO and CISOSecurity InfrastructureSecurity Practicesnews analysis39% of IT leaders fear major incident due to excessive workloadsIT leaders worry that ongoing staff shortages in the face of escalating workloads could result in a business-crippling event. Security specialists point to retraining and other techniques to help mitigate the problem.By Evan Schuman Feb 3, 2025 6 minsIT Skills and TrainingIncident ResponseRisk ManagementfeatureBeware cybersecurity tech that’s past its prime — 5 areas to check or retireCybersecurity products are evolving quickly, more so than ever with the advent of AI-driven resources. Here are some technologies and practices that are getting long in the tooth.By Mary K. Pratt Jan 14, 2025 7 minsCSO and CISOSecurity InfrastructureSecurity Practicesnews analysisUS military allocated about $30 billion to spend on cybersecurity in 2025The 2025 NDAA provides the US military with funding to rip Chinese gear out of telecom networks, protect mobile devices from foreign spyware, create an AI security center, and much more.By Cynthia Brumfield Jan 7, 2025 8 minsGovernment ITMilitarySecurity Infrastructure Show more Show less View all Resources whitepaper さまざまなマシン アイデンティティのセキュリティ確保に関する重要な考慮事項 組織がクラウドネイティブアーキテクチャ、AI、DevOps、自動化を採用するにつれて、マシン ID の爆発的な増加が深刻なリスクをもたらしています。マイクロサービス、ボット、アプリケーションなどのこれらの ID は、その機能にシークレットに依存しています。しかし、それらを集中的に管理するアプローチがない場合、シークレットは散在し、ハードコードされ、危険な状態にさらされます。 The post さまざまなマシン アイデンティティのセキュリティ確保に関する重要な考慮事項 appeared first on Whitepaper Repository –. By CyberArk Software 29 Sep 2025Identity Management SolutionsSecuritySecurity Infrastructure whitepaper セキュリティ監査において、お使いのコンピュータが最大の弱点である可能性があります By CyberArk Software 29 Sep 2025SecuritySecurity InfrastructureVulnerabilities whitepaper A Proactive Approach to Generative AI for Cybersecurity By Google Cloud 09 Apr 2024Artificial IntelligenceSecurity InfrastructureSecurity Operations Center View all Podcasts podcastsCSO Executive Sessions: IndiaHost Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.5 episodesApplication SecurityCloud Security Ep. 05 CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jun 20, 202317 mins CSO and CISO Ep. 04 CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jun 20, 202318 mins CSO and CISO Video on demand video What is zero trust security? Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 6, 2023 3 minsAccess ControlNetwork SecurityZero Trust See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyView all topics Show me morePopularArticlesPodcastsVideos opinion Defending digital identity from computer-using agents (CUAs) By Srinivasa Ravi Teja PeriNov 7, 20259 mins AuthenticationPasswordsPhishing news Vibe-coded ransomware proof-of-concept ended up on Microsoft’s marketplace By Shweta SharmaNov 7, 20254 mins CybercrimeMalwareRansomware opinion Business continuity and cybersecurity: Two sides of the same coin By Omowunmi MakindeNov 7, 20257 mins CyberattacksData BreachHacking podcast CSO Executive Sessions: Leading the Charge on Cyber Agility for Southeast Asia’s Digital Future By Estelle QuekOct 2, 202521 mins Cloud SecurityCyberattacksThreat and Vulnerability Management podcast CSO Executive Session ASEAN: Navigating the Cyber Battleground, Strengthening Southeast Asia’s Digital Defense By Estelle QuekSep 23, 202541 mins CyberattacksCybercrimeThreat and Vulnerability Management podcast CSO Executive Session ASEAN: Navigating sophisticated cyberthreats in Southeast Asia region By Estelle QuekSep 16, 202548 mins CybercrimeRansomware video CSO Executive Sessions: Leading the Charge on Cyber Agility for Southeast Asia’s Digital Future By Estelle QuekOct 2, 202521 mins Cloud SecurityCyberattacksThreat and Vulnerability Management video CSO Executive Session ASEAN: Navigating the Cyber Battleground, Strengthening Southeast Asia’s Digital Defense By Estelle QuekSep 23, 202541 mins CyberattacksThreat and Vulnerability ManagementZero Trust video CSO Executive Session ASEAN: Navigating sophisticated cyberthreats in the Southeast Asia region By Estelle QuekSep 15, 202548 mins CybercrimeRansomware