opinionWebsite spoofing: risks, threats, and mitigation strategies for CIOsIn this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them.By Yash MehtaDec 01, 20235 minsCIOCyberattacksSecurity ArticlesbrandpostSponsored by Palo Alto NetworksUnveiling the risks of OT systems and how to secure themWhile securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.By Matt Kraning, CTO of Cortex at Palo Alto Networks Oct 24, 2023 5 minsSecuritybrandpostSponsored by Palo Alto NetworksFortifying your engineering ecosystem: The three pillars of application securityFocus on these three disciplines to help your security and developer teams build modern, secure, and scalable engineering ecosystems in the cloud.By Daniel Krivelvich Oct 23, 2023 5 minsSecuritybrandpostSponsored by ZscalerAddressing the insecurity of verified identitiesToo many security practitioners still view identity as a zero-sum game, so if attackers can fool identity verification at log-on, they win access to everything. Enter, identity threat detection and remediation (ITDR).By Jeff Spencer, Deception Specialist at Zscaler Oct 19, 2023 6 minsSecuritybrandpostSponsored by ZscalerThe 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successesUnlocking the power of true zero trust: Zscaler's four pillars of security for proactive defense, digital transformation, and seamless cloud and hybrid work models — as revealed through the success stories of 7,700+ organizations relying on Zscaler to fortify security posture and supercharge digital transformation.By Zscaler Oct 17, 2023 7 minsSecurityopinionDon’t gamble with your identity verification practicesRansomware attacks are becoming more prevalent and lucrative for hackers. These incidents are likely to persist until industry mechanisms are implemented to verify individuals' identities effectively.By Rick Grinnell Oct 16, 2023 5 minsRansomwareSecuritybrandpostSponsored by Rocket SoftwareExploring crucial terminal emulation capabilitiesThese four factors are highly necessary for successful implementation and to maximize ROI.By Milan Shetti, CEO, Rocket Software Oct 16, 2023 5 minsSecuritybrandpostSponsored by VerizonPCI compliance: The best defense is a great defenseWith bad actors and cybercriminals more sophisticated than ever, protecting payment data is key. Fortunately, PCI DSS compliance provides a robust defense.By Ken Phillips Oct 16, 2023 3 minsSecuritybrandpostSponsored by VerizonPCI DSS version 4.0: Is your payment card data security program ready?As the current PCI DSS Standard nears retirement, organizations are asking themselves if their payment data security program is ready for PCI DSS version 4.0. By Ken Phillips Oct 16, 2023 4 minsSecuritybrandpostSponsored by VerizonPCI compliance: Is your qualified security assessor up to the task?As organizations take steps to address the many new requirements in PCI DSS version 4.0, Verizon—the longest-operating PCI services provider—reminds CIOs and CISOs not to forget the human element and the crucially important role quality security assessors play. By Ken Phillips Oct 16, 2023 4 minsSecurityopinionThe changing face of cybersecurity threats in 2023Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 minsCybercrimeSecurityopinionFour questions for a casino InfoSec directorBy Beth Kormanik Sep 21, 2023 3 minsMedia and Entertainment IndustryEventsSecurityopinionThe big speed bump on the road to GenAIBy Aaron Goldberg Sep 14, 2023 1 minEventsArtificial IntelligenceSecurity Show more Show less View all Upcoming Events07/Dec virtual summit CSO's Future of Cybersecurity SummitDec 07, 2023Virtual CSO and CISOCyberattacksSecurity View all events Resources whitepaper Turn the Recession Into an Opportunity: Reallocate Budget to Transform the IT Operating Model CIOs should approach the recession as an opportunity to enable future growth and competitiveness. The post Turn the Recession Into an Opportunity: Reallocate Budget to Transform the IT Operating Model appeared first on Whitepaper Repository. By Rimini Street 05 Dec 2023Application Performance ManagementBusiness OperationsIT Management whitepaper Renovate or Replace: How to Decide Which Is Best for Your ERP By Rimini Street 05 Dec 2023Other whitepaper A holistic approach to designing large language model applications By AWS and Mission Cloud 05 Dec 2023Application Performance ManagementArtificial IntelligenceMachine Learning View all Podcasts podcastsThe C-level Strategic Guide for CIAM investmentWhat is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 0 episodeIdentity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy May 25, 202120 mins OktaIdentity and Access ManagementSecurity Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate May 12, 202115 mins OktaIdentity and Access ManagementSecurity Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Generative AI Show me morePopularArticlesPodcastsVideos brandpost Sponsored by AWS in collaboration with IBM How digital twin technology is changing complex industrial processes forever Dec 05, 20234 mins Digital Transformation brandpost Sponsored by AWS in collaboration with IBM Why modernising applications needs to be a ‘must’ for businesses seeking growth Dec 05, 20235 mins Digital Transformation opinion 11 ways to reduce your IT costs now By Stephanie Overby Dec 05, 202311 mins BudgetCloud ManagementIT Governance podcast CIO Leadership Live Australia with Suzanne Hall, Chief Information Officer, Baptcare Dec 05, 202322 mins CIO Leadership Live podcast CIO Leadership Live India with Kirti Patil, CTO, Kotak Life Insurance Dec 05, 202326 mins CIO Leadership Live podcast CIO Leadership Live India with Jai Prakash Sharma, Executive VP, Technology, Info Edge India Ltd. Nov 30, 202327 mins CIO Leadership Live video CIO Leadership Live Australia with Suzanne Hall, Chief Information Officer, Baptcare Dec 05, 202322 mins CIO Leadership Live video CIO Leadership Live India with Kirti Patil, CTO, Kotak Life Insurance Dec 05, 202326 mins CIO Leadership Live video CIO Leadership Live India with Jai Prakash Sharma, Executive VP, Technology, Info Edge India Ltd. Nov 30, 202327 mins CIO Leadership Live