Cso Online

Cso Online company information, Employees & Contact Information

Explore related pages

Related company profiles:

CSO (from Foundry) provides news, analysis and research on a broad range of security and risk management topics. Areas of focus include cyber security, information security, business continuity, identity and access management, loss prevention and more. Reach Executive Editor Amy Bennett at amy_bennett@idg.com

Company Details

Employees
81
Founded
-
Address
New York City, New York, Us
Phone
(508) 872-0080
Email
on****@****xo.com.
Industry
Online Audio And Video Media
HQ
New York City, New York
Looking for a particular Cso Online employee's phone or email?

Cso Online Questions

News

Step aside, SOC. It’s time to ROC - csoonline.com

Step aside, SOC. It’s time to ROC csoonline.com

Do CISOs need to rethink service provider risk? - csoonline.com

Do CISOs need to rethink service provider risk? csoonline.com

70% of CISOs say internal conflicts more damaging than cyberattacks - csoonline.com

70% of CISOs say internal conflicts more damaging than cyberattacks csoonline.com

The 10 biggest issues CISOs and cyber teams face today - csoonline.com

The 10 biggest issues CISOs and cyber teams face today csoonline.com

Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity - csoonline.com

Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity csoonline.com

Data sovereignty proof: How to verify controls like ‘Project Texas’ - csoonline.com

Data sovereignty proof: How to verify controls like ‘Project Texas’ csoonline.com

Europol disrupts network behind 49 million fake accounts - csoonline.com

Europol disrupts network behind 49 million fake accounts csoonline.com

Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts - csoonline.com

Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts csoonline.com

Scammers try to trick LastPass users into giving up credentials by telling them they’re dead - csoonline.com

Scammers try to trick LastPass users into giving up credentials by telling them they’re dead csoonline.com

UN agreement on cybercrime criticized over risks to cybersecurity researchers - csoonline.com

UN agreement on cybercrime criticized over risks to cybersecurity researchers csoonline.com

Why must CISOs slay a cyber dragon to earn business respect? - csoonline.com

Why must CISOs slay a cyber dragon to earn business respect? csoonline.com

Ransomware recovery perils: 40% of paying victims still lose their data - csoonline.com

Ransomware recovery perils: 40% of paying victims still lose their data csoonline.com

Critical Microsoft WSUS flaw exploited in wild after insufficient patch - csoonline.com

Critical Microsoft WSUS flaw exploited in wild after insufficient patch csoonline.com

Unterstützung für Dobrindts Pläne zu aktiver Cyberabwehr - csoonline.com

Unterstützung für Dobrindts Pläne zu aktiver Cyberabwehr csoonline.com

Network security devices endanger orgs with ’90s era flaws - csoonline.com

Network security devices endanger orgs with ’90s era flaws csoonline.com

Salesforce AI agents set to assist enterprises with security and compliance - csoonline.com

Salesforce AI agents set to assist enterprises with security and compliance csoonline.com

CISOs’ security priorities reveal an augmented cyber agenda - csoonline.com

CISOs’ security priorities reveal an augmented cyber agenda csoonline.com

Gemini Trifecta: AI autonomy without guardrails opens new attack surface - csoonline.com

Gemini Trifecta: AI autonomy without guardrails opens new attack surface csoonline.com

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws - csoonline.com

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws csoonline.com

Prompt hijacking puts MCP-based AI workflows at risk - csoonline.com

Prompt hijacking puts MCP-based AI workflows at risk csoonline.com

Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift - csoonline.com

Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift csoonline.com

The CIA triad is dead — stop using a Cold War relic to fight 21st century threats - csoonline.com

The CIA triad is dead — stop using a Cold War relic to fight 21st century threats csoonline.com

4 factors creating bottlenecks for enterprise GenAI adoption - csoonline.com

4 factors creating bottlenecks for enterprise GenAI adoption csoonline.com

5 ways CISOs are experimenting with AI - csoonline.com

5 ways CISOs are experimenting with AI csoonline.com

How AI is reshaping cybersecurity operations - csoonline.com

How AI is reshaping cybersecurity operations csoonline.com

CISOs brace for an “AI vs. AI” fight - csoonline.com

CISOs brace for an “AI vs. AI” fight csoonline.com

Autonomous AI hacking and the future of cybersecurity - csoonline.com

Autonomous AI hacking and the future of cybersecurity csoonline.com

US NSA alleged to have launched a cyber attack on a Chinese agency - csoonline.com

US NSA alleged to have launched a cyber attack on a Chinese agency csoonline.com

CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed - csoonline.com

CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed csoonline.com

AI-enabled ransomware attacks: CISO’s top security concern — with good reason - csoonline.com

AI-enabled ransomware attacks: CISO’s top security concern — with good reason csoonline.com

AI powered autonomous ransomware campaigns are coming, say experts - csoonline.com

AI powered autonomous ransomware campaigns are coming, say experts csoonline.com

Open-source DFIR Velociraptor was abused in expanding ransomware efforts - csoonline.com

Open-source DFIR Velociraptor was abused in expanding ransomware efforts csoonline.com

58% of CISOs are boosting AI security budgets - csoonline.com

58% of CISOs are boosting AI security budgets csoonline.com

SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist - csoonline.com

SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist csoonline.com

6 hard truths security pros must learn to live with - csoonline.com

6 hard truths security pros must learn to live with csoonline.com

CrowdStrike cuts 500 jobs in AI pivot, but flags risks - csoonline.com

CrowdStrike cuts 500 jobs in AI pivot, but flags risks csoonline.com

From prevention to rapid response: The new era of CISO strategy - csoonline.com

From prevention to rapid response: The new era of CISO strategy csoonline.com

A CISO’s guide to monitoring the dark web - csoonline.com

A CISO’s guide to monitoring the dark web csoonline.com

ClayRat spyware turns phones into distribution hubs via SMS and Telegram - csoonline.com

ClayRat spyware turns phones into distribution hubs via SMS and Telegram csoonline.com

The 20 biggest data breaches of the 21st century - csoonline.com

The 20 biggest data breaches of the 21st century csoonline.com

Source code and vulnerability info stolen from F5 Networks - csoonline.com

Source code and vulnerability info stolen from F5 Networks csoonline.com

SonicWall data breach affects all cloud backup customers - csoonline.com

SonicWall data breach affects all cloud backup customers csoonline.com

Government considered destroying its data hub after decade-long intrusion - csoonline.com

Government considered destroying its data hub after decade-long intrusion csoonline.com

Trust in MCP takes first in-the-wild hit via squatted Postmark connector - csoonline.com

Trust in MCP takes first in-the-wild hit via squatted Postmark connector csoonline.com

Black Hat: Researchers demonstrate zero-click prompt injection attacks in popular AI agents - csoonline.com

Black Hat: Researchers demonstrate zero-click prompt injection attacks in popular AI agents csoonline.com

Google kills its cookie killer - csoonline.com

Google kills its cookie killer csoonline.com

Is the CISO role broken? - csoonline.com

Is the CISO role broken? csoonline.com

8 trends transforming the MDR market today - csoonline.com

8 trends transforming the MDR market today csoonline.com

25% of security leaders replaced after ransomware attack - csoonline.com

25% of security leaders replaced after ransomware attack csoonline.com

Oracle Cloud breach may impact 140,000 enterprise customers - csoonline.com

Oracle Cloud breach may impact 140,000 enterprise customers csoonline.com

Beyond cryptocurrency: Blockchain 101 for CISOs and why it matters - csoonline.com

Beyond cryptocurrency: Blockchain 101 for CISOs and why it matters csoonline.com

CrowdStrike buys Onum in agentic SOC push - csoonline.com

CrowdStrike buys Onum in agentic SOC push csoonline.com

Hacker inserts destructive code in Amazon Q tool as update goes live - csoonline.com

Hacker inserts destructive code in Amazon Q tool as update goes live csoonline.com

Verified, but vulnerable: Malicious extensions exploit IDE trust badges - csoonline.com

Verified, but vulnerable: Malicious extensions exploit IDE trust badges csoonline.com

Beef up AI security with zero trust principles - csoonline.com

Beef up AI security with zero trust principles csoonline.com

Chaos-Mesh flaws put Kubernetes clusters at risk of full takeover - csoonline.com

Chaos-Mesh flaws put Kubernetes clusters at risk of full takeover csoonline.com

What is the cost of a data breach? - csoonline.com

What is the cost of a data breach? csoonline.com

Pressure on CISOs to stay silent about security incidents growing - csoonline.com

Pressure on CISOs to stay silent about security incidents growing csoonline.com

Cisco patches max-severity flaw allowing arbitrary command execution - csoonline.com

Cisco patches max-severity flaw allowing arbitrary command execution csoonline.com

The books shaping today’s cybersecurity leaders - csoonline.com

The books shaping today’s cybersecurity leaders csoonline.com

Russian hackers exploit old Cisco flaw to target global enterprise networks - csoonline.com

Russian hackers exploit old Cisco flaw to target global enterprise networks csoonline.com

AI-powered phishing scams now use fake captcha pages to evade detection - csoonline.com

AI-powered phishing scams now use fake captcha pages to evade detection csoonline.com

LLMs easily exploited using run-on sentences, bad grammar, image scaling - csoonline.com

LLMs easily exploited using run-on sentences, bad grammar, image scaling csoonline.com

Cryptoagility: the strategic pillar for digital resilience - csoonline.com

Cryptoagility: the strategic pillar for digital resilience csoonline.com

Microsoft fixes the fixes that broke Windows tools - csoonline.com

Microsoft fixes the fixes that broke Windows tools csoonline.com

Poisoned models in fake Alibaba SDKs show challenges of securing AI supply chains - csoonline.com

Poisoned models in fake Alibaba SDKs show challenges of securing AI supply chains csoonline.com

Why domain-based attacks will continue to wreak havoc - csoonline.com

Why domain-based attacks will continue to wreak havoc csoonline.com

Warning: Flaws in Copeland OT controllers can be leveraged by threat actors - csoonline.com

Warning: Flaws in Copeland OT controllers can be leveraged by threat actors csoonline.com

CVE program averts swift end after CISA executes 11-month contract extension - csoonline.com

CVE program averts swift end after CISA executes 11-month contract extension csoonline.com

7 obsolete security practices that should be terminated immediately - csoonline.com

7 obsolete security practices that should be terminated immediately csoonline.com

CrowdStrike bets big on agentic AI with new offerings after $290M Onum buy - csoonline.com

CrowdStrike bets big on agentic AI with new offerings after $290M Onum buy csoonline.com

6 hot cybersecurity trends - csoonline.com

6 hot cybersecurity trends csoonline.com

Patch now: Citrix Bleed 2 vulnerability actively exploited in the wild - csoonline.com

Patch now: Citrix Bleed 2 vulnerability actively exploited in the wild csoonline.com

Cybersecurity in the supply chain: strategies for managing fourth-party risks - csoonline.com

Cybersecurity in the supply chain: strategies for managing fourth-party risks csoonline.com

CISOs no closer to containing shadow AI’s skyrocketing data risks - csoonline.com

CISOs no closer to containing shadow AI’s skyrocketing data risks csoonline.com

CISOs rethink the security organization for the AI era - csoonline.com

CISOs rethink the security organization for the AI era csoonline.com

Spain to vet power plants’ cybersecurity for ‘great blackout’ cause - csoonline.com

Spain to vet power plants’ cybersecurity for ‘great blackout’ cause csoonline.com

CSO Awards 2025 showcase world-class security strategies - csoonline.com

CSO Awards 2025 showcase world-class security strategies csoonline.com

5 key takeaways from Black Hat USA 2025 - csoonline.com

5 key takeaways from Black Hat USA 2025 csoonline.com

RSA Conference 2025 — News and analysis - csoonline.com

RSA Conference 2025 — News and analysis csoonline.com

9 things CISOs need to know about the dark web - csoonline.com

9 things CISOs need to know about the dark web csoonline.com

6 things keeping CISOs up at night - csoonline.com

6 things keeping CISOs up at night csoonline.com

CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness - csoonline.com

CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness csoonline.com

Researchers uncover RCE attack chains in popular enterprise credential vaults - csoonline.com

Researchers uncover RCE attack chains in popular enterprise credential vaults csoonline.com

Oracle E-Business Suite users targeted in extortion campaign - csoonline.com

Oracle E-Business Suite users targeted in extortion campaign csoonline.com

Midnight Blizzard or Cozy Bear? Microsoft and CrowdStrike say it’s time to end the confusion - csoonline.com

Midnight Blizzard or Cozy Bear? Microsoft and CrowdStrike say it’s time to end the confusion csoonline.com

CISA 2015 cyber threat info-sharing law lapses amid government shutdown - csoonline.com

CISA 2015 cyber threat info-sharing law lapses amid government shutdown csoonline.com

CISA flags Commvault zero-day as part of wider SaaS attack campaign - csoonline.com

CISA flags Commvault zero-day as part of wider SaaS attack campaign csoonline.com

5 trends reshaping IT security strategies today - csoonline.com

5 trends reshaping IT security strategies today csoonline.com

What is a CISO? The top IT security leader role explained - csoonline.com

What is a CISO? The top IT security leader role explained csoonline.com

AI coding assistants amplify deeper cybersecurity risks - csoonline.com

AI coding assistants amplify deeper cybersecurity risks csoonline.com

Windows tips for reducing the ransomware threat - csoonline.com

Windows tips for reducing the ransomware threat csoonline.com

Beijing may have breached US government systems before Cityworks plugged a critical flaw - csoonline.com

Beijing may have breached US government systems before Cityworks plugged a critical flaw csoonline.com

How CISOs can scale down without compromising security - csoonline.com

How CISOs can scale down without compromising security csoonline.com

Meet LockBit 5.0: Faster ESXi drive encryption, better at evading detection - csoonline.com

Meet LockBit 5.0: Faster ESXi drive encryption, better at evading detection csoonline.com

Entra ID vulnerability exposes gaps in cloud identity trust models, experts warn - csoonline.com

Entra ID vulnerability exposes gaps in cloud identity trust models, experts warn csoonline.com

Government shutdown deepens US cyber risk, exposing networks to threat actors - csoonline.com

Government shutdown deepens US cyber risk, exposing networks to threat actors csoonline.com

OT security: Why it pays to look at open source - csoonline.com

OT security: Why it pays to look at open source csoonline.com

Fog ransomware gang abuses employee monitoring tool in unusual multi-stage attack - csoonline.com

Fog ransomware gang abuses employee monitoring tool in unusual multi-stage attack csoonline.com

Ivanti patches two EPMM flaws exploited in the wild - csoonline.com

Ivanti patches two EPMM flaws exploited in the wild csoonline.com

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant