Latest from todayOpinionSupply chain security is now a board-level issue: Here's what CSOs need to knowSecurity isn't just your problem anymore — it's the board's. With 97% of apps using open-source, CSOs need to ditch the false positives and get serious about SBOMs.By Scott RegisterApr 7, 20269 minsApplication SecurityMarketsTransportation and Logistics Industry News A core infrastructure engineer pleads guilty to federal charges in insider attackBy Evan SchumanApr 3, 20263 minsCyberattacksCybercrimeLegalNews US authorities punish sellers of malware and spywareBy Maxwell CooterFeb 27, 20262 minsCybercrimeLegalVulnerabilities NewsGoogle fears massive attempt to clone Gemini AI through model extraction By Gyana Swain Feb 13, 20266 minsData and Information SecurityGenerative AIIntellectual Property OpinionNIS2: Supply chains as a risk factorBy Thomas Kress Feb 9, 20266 minsComplianceLaws and RegulationsSupply Chain BrandPostSponsored by CyberNewsWireSpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity ThreatsBy Cyber NewsWire – Paid Press Release Jan 14, 20266 minsBusiness OperationsCyberattacksSupply Chain OpinionInvisible battles: How cybersecurity work erodes mental health in silenceBy Maman Ibrahim Nov 24, 20258 minsBurnoutEmployee ExperienceHuman Resources OpinionFrom code to boardroom: A GenAI GRC approach to supply chain riskBy Adetunji Adebayo Nov 21, 20257 minsGenerative AIIT GovernanceRisk Management NewsGoogle asks US court to shut down Lighthouse phishing-as-a-service operationBy Howard Solomon Nov 12, 20256 minsCybercrimePhishingSocial Engineering ArticlesfeatureModern supply-chain attacks and their real-world impactSupply-chain attacks have evolved considerably in the last two years going from dependency confusion or stolen SSL among others once common attacks to AI-backed social engineering and open-source registries.By Ax Sharma Nov 4, 2025 10 minsCyberattacksCybercrimeMalwarenews analysisUS Appeals Court lowers burden of proof for data breach lawsuitsThe 4th Circuit Court has ruled that dark web data publication alone may be damaging — a decision that could raise extortion stakes, rewrite CISOs’ risk calculus, and increase breached companies’ lawsuit exposure.By Evan Schuman Nov 3, 2025 5 minsCyberattacksCybercrimeData Breachnews analysis71% of CISOs hit with third-party security incident this yearIncreasingly complex business partnerships and rising reliance on third-party software components are proving to be ever weakening cybersecurity links. By John Leyden Sep 9, 2025 6 minsCyberattacksCybercrimeData Breachnews analysisAttackers steal data from Salesforce instances via compromised AI live chat toolOne of their goals was to access other credentials to compromise other environments.By Lucian Constantin Aug 26, 2025 5 minsAccess ControlApplication SecuritySupply ChainbrandpostSponsored by CyberNewsWireSpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity ThreatsBy Cyber NewsWire – Paid Press Release Jan 14, 2026 6 minsBusiness OperationsCyberattacksSupply ChainnewsSupply chain attack compromises npm packages to spread backdoor malware Phishing attacks on package maintainer accounts led to infected JavaScript type testing utilities.By John E. Dunn Jul 24, 2025 5 minsMalwareOpen SourceSupply ChainfeatureCybersecurity in the supply chain: strategies for managing fourth-party risksThird-party vendors are a well-known risk but they are often not the last point in the supply chain and cybersecurity leaders need to ensure fourth-party providers are given the same treatment.By Linda Rosencrance Jul 4, 2025 9 minsIT GovernanceSecuritySupply ChainnewsUS indicts one for role in BreachForums, France arrests four othersA US court has indicted a man arrested earlier this year on suspicion of being an administrator of stolen data marketplace BreachForum, while on Monday French police arrested four others suspected of running the site.By Shweta Sharma Jun 26, 2025 4 minsData BreachHackingLegalnewsChain IQ data theft highlights need to oversee third party suppliersFirm says hack on 19 companies came from ‘tools and techniques that had never before been seen on a global scale.’By Howard Solomon Jun 19, 2025 5 minsData BreachSupply Chainfeature4 ways to safeguard CISO communications from legal liabilitiesThe SEC’s lawsuit against SolarWinds’ CISO highlights the legal liabilities CISOs can face when communicating. Here are four ways CISOs can avoid the pitfalls.By Cynthia Brumfield May 20, 2025 9 minsCSO and CISOLaws and RegulationsLegalfeatureIs HR running your employee security training? Here’s why that’s not always the best ideaTraining employees to resist the lure of phishing, scams, and deepfakes is central to a good cybersecurity posture, but to be effective it needs to be handled with plenty of input and guidance from the security team.By Linda Rosencrance Apr 9, 2025 9 minsCSO and CISOHuman ResourcesIT Skills and TrainingopinionWhy DEI is key for a cyber safe futureDiversity, equity, and inclusion (DEI) can be a cyber superpower — not just for reducing security skills gaps but for ensuring cybersecurity teams make defenses stronger and more adaptive.By Bridget Chan, Camille Stewart Gloster and Katelyn Ringrose Apr 8, 2025 5 minsCybercrimeDiversity and InclusionHuman ResourcesfeatureVeterans are an obvious fit for cybersecurity, but tailored support ensures they succeedPaying attention to the specific needs of military members transitioning to civilian security positions can help organizations improve their recruitment and retention, and the process can benefit hiring programs in general.By Mary K. Pratt Apr 3, 2025 9 minsHiringHuman ResourcesMilitary Show more Show less View all Upcoming Events11/May-13/May conference CSO Cybersecurity Awards & Conference US 2026May 11, 2026Loews Nashville Hotel at Vanderbilt Plaza, Nashville, TN CSO and CISOCSO50IT Leadership View all events Resources whitepaper Peer insights on AI adoption and the disaster recovery gap Autonomous AI, SaaS sprawl, and limited testing are exposing gaps in enterprise disaster recovery readiness. The post Peer insights on AI adoption and the disaster recovery gap appeared first on Whitepaper Repository –. By Keepit 29 Apr 2026Artificial IntelligenceBusiness OperationsGenerative AI whitepaper Checklist: Three Barriers Killing Your Strategy By Atlassian 27 Apr 2026Artificial IntelligenceBusiness OperationsDigital Transformation whitepaper Infographic: The AI Paradox in Your Enterprise By Atlassian 27 Apr 2026Artificial IntelligenceBusiness OperationsDigital Transformation View all Explore a topicApplication SecurityBusiness ContinuityCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos opinion Human-centric failures: Why BEC continues to work despite MFA By Oludolamu OnimoleMay 1, 20268 mins Access ControlAuthenticationMultifactor Authentication feature Just 34% of cyber pros plan to stick with their current employer By John LeydenMay 1, 20266 mins CareersHiringStaff Management opinion Managing OT risk at scale: Why OT cyber decisions are leadership decisions By Marco Túlio MoraesMay 1, 20268 mins CyberattacksIT LeadershipRisk Management podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle Quek25 Feb 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle Quek25 Feb 202623 mins CSO and CISOElectronic Health RecordsRansomware video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business