www.csoonline.com
Open in
urlscan Pro
151.101.2.165
Public Scan
Submitted URL: https://gehriger.ch/
Effective URL: https://www.csoonline.com/
Submission: On May 18 via api from CH — Scanned from CH
Effective URL: https://www.csoonline.com/
Submission: On May 18 via api from CH — Scanned from CH
Form analysis
1 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id1"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;" dir="ltr" spellcheck="false"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>suchen</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="Ergebnisse löschen"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
* Topics * Events * Newsletters * Resources * Community ABOUT * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters POLICIES * Terms of Service * Privacy Policy * Cookie Policy * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights OUR NETWORK * CIO * Computerworld * InfoWorld * Network World MORE * Awards * Blogs * BrandPosts * Events * Podcasts * Videos * Enterprise Buyer’s Guides Close * Artificial Intelligence * Generative AI * Business Operations * Careers * Industry * IT Leadership * Compliance * Security * Application Security * Business Continuity * Cloud Security * Critical Infrastructure * Cybercrime * Identity and Access Management * Network Security * Physical Security * Privacy * Risk Management * Security Infrastructure * Vulnerabilities * Software Development * Enterprise Buyer’s Guides Back Close AMERICAS * United States ASIA * ASEAN * India EUROPE * United Kingdom OCEANIA * Australia Back Close × suchen Popular Topics * Search * US-EN * Topics * Events * Newsletters * Resources * Community * About * Policies * Our Network * More Back TOPICS * Artificial Intelligence * Generative AI * Business Operations * Careers * Industry * IT Leadership * Compliance * Security * Application Security * Business Continuity * Cloud Security * Critical Infrastructure * Cybercrime * Identity and Access Management * Network Security * Physical Security * Privacy * Risk Management * Security Infrastructure * Vulnerabilities * Software Development * Enterprise Buyer’s Guides Back ABOUT * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters Back POLICIES * Terms of Service * Privacy Policy * Cookie Policy * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights Back OUR NETWORK * CIO * Computerworld * InfoWorld * Network World Back MORE * Awards * Blogs * BrandPosts * Events * Podcasts * Videos * Enterprise Buyer’s Guides news analysis SEC RULE FOR FINANCE FIRMS BOOSTS DISCLOSURE REQUIREMENTS Amendments to Regulation S-P requires broker-dealers, investment companies, registered investment advisers, and transfer agents to disclose incidents to customers. By Evan Schuman May 17, 20245 mins Data BreachFinancial Services IndustryData Privacy feature CYBER RESILIENCE: A BUSINESS IMPERATIVE CISOS MUST GET RIGHT By Andrada Fiscutean May 16, 202412 mins CSO and CISORegulationIncident Response feature BACKLOGS AT NATIONAL VULNERABILITY DATABASE PROMPT ACTION FROM NIST AND CISA By John Mello Jr. May 15, 202410 mins Threat and Vulnerability ManagementSecurity PracticesVulnerabilities news US AI EXPERTS TARGETED IN CYBERESPIONAGE USING SUGARGH0ST RAT By Lucian Constantin May 16, 20244 mins PhishingData and Information Security news BREACHFORUMS SEIZED BY LAW ENFORCEMENT, ADMIN BAPHOMET ARRESTED By Shweta Sharma May 16, 20244 mins Data BreachCybercrime news analysis MICROSOFT FIXES THREE ZERO-DAY VULNERABILITIES, TWO ACTIVELY EXPLOITED By Lucian Constantin May 15, 20246 mins Windows SecurityZero-day vulnerability news SINGING RIVER RANSOMWARE ATTACK NOW THOUGHT TO HAVE AFFECTED OVER 895,000 By Shweta Sharma May 15, 20244 mins Data BreachRansomware feature LOW-TECH TACTICS STILL TOP THE IT SECURITY RISK CHART By Rosalyn Page May 14, 20249 mins CyberattacksSocial EngineeringData and Information Security news EQUIPPED WITH AI TOOLS, HACKERS MAKE APPS RISKIER THAN EVER By Shweta Sharma May 14, 20244 mins Application Security MORE SECURITY NEWS news FCC PROPOSES BGP SECURITY MEASURES Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 1 min RegulationNetwork Security news CYCODE ROLLS OUT ASPM CONNECTOR MARKETPLACE, ANALYSTS SEE IT AS BARE MINIMUM Application security posture management tools need to integrate with other security tools to do their job. By Evan Schuman May 16, 2024 4 mins Application Security news BLACK BASTA RANSOMWARE IMPACTED OVER 500 ORGANIZATIONS WORLDWIDE CISA advisory includes indicators of compromise and TTPs that can be used for threat hunting. By Lucian Constantin May 14, 2024 6 mins RansomwarePhishingHealthcare Industry news INTELBROKER STEALS CLASSIFIED DATA FROM THE EUROPOL WEBSITE The agency said core operations remain unaffected even as IntelBroker claimed to possess classified, law enforcement data. By Shweta Sharma May 13, 2024 3 mins Data BreachHacker Groups news CISA INKS 68 TECH VENDORS TO SECURE-BY-DESIGN PLEDGE — BUT WILL IT MATTER? CISA’s pledge drew some big names, but the impact on software security could be limited. Meanwhile the org has extended its comment period on the CIRCIA cyberattack reporting law. By Jon Gold May 10, 2024 4 mins RegulationTechnology IndustrySecurity Practices news GOOGLE CHROME GETS A PATCH FOR ACTIVELY EXPLOITED ZERO-DAY VULNERABILITY Details of the use-after-free memory vulnerability were not publicly released, but Google says it’s aware an exploit for the bug exists. By Lucian Constantin May 10, 2024 3 mins Threat and Vulnerability ManagementZero-day vulnerabilityVulnerabilities news DELL DATA BREACH EXPOSES DATA OF 49 MILLION CUSTOMERS The company says the breach compromised non-critical customer data and involved no sensitive personal or financial information. By Shweta Sharma May 10, 2024 3 mins Data BreachHacking news ZSCALER SHUTS DOWN EXPOSED SYSTEM AFTER RUMORS OF A CYBERATTACK Initially dismissing rumors, Zscaler now says it did have a system exposed but nothing important has been accessed. By Shweta Sharma May 09, 2024 3 mins Data BreachCyberattacks news PALO ALTO LAUNCHES AI-POWERED SOLUTIONS TO FIGHT AI-GENERATED CYBERTHREATS The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies. By Prasanth Aby Thomas May 09, 2024 3 mins Generative AISecurity Software news F5 PATCHES BIG-IP NEXT CENTRAL MANAGER FLAWS THAT COULD LEAD TO DEVICE TAKEOVER Two high-risk vulnerabilities could allow attackers to gain full administrative control on devices via leaked password hashes. By Lucian Constantin May 08, 2024 5 mins Threat and Vulnerability ManagementCloud SecurityVulnerabilities news SUSPECTED CHINESE HACK OF BRITAIN’S MINISTRY OF DEFENCE LINKED TO CONTRACTOR, MINISTER CONFIRMS The UK’s defence minister would not confirm that the attack was conducted by an element of the Chinese state, rather blaming the “potential failings” of a partner. By John Dunn May 08, 2024 4 mins Aerospace and Defense IndustryData BreachGovernment news analysis MASSIVE SECURITY HOLE IN VPNS SHOWS THEIR SHORTCOMINGS AS A DEFENSIVE MEASURE Researchers found a deep, unpatchable flaw in virtual private networks dubbed Tunnelvision can allow attackers to siphon off data without any indication that they are there. By Evan Schuman May 08, 2024 8 mins Threat and Vulnerability ManagementData and Information SecurityNetwork Security Show more Show less EXPLORE A TOPIC * Generative AI * Application Security * Business Continuity * Business Operations * Careers * Cloud Security * Compliance * Critical Infrastructure * Cybercrime * Identity and Access Management * Industry * IT Leadership * Network Security * Physical Security * View all topics ALL TOPICS Close * Generative AI * Application Security * Business Continuity * Business Operations * Careers * Cloud Security * Compliance * Critical Infrastructure * Cybercrime * Identity and Access Management * Industry * IT Leadership * Network Security * Physical Security * Privacy * Risk Management * Security * Security Infrastructure * Software Development * Vulnerabilities POPULAR TOPICS GENERATIVE AI news SECURITI ADDS DISTRIBUTED LLM FIREWALLS TO SECURE GENAI APPLICATIONS By Shweta Sharma Apr 30, 2024 4 mins Generative AI news TOP CYBERSECURITY PRODUCT NEWS OF THE WEEK By CSO staff Apr 26, 2024 81 mins Generative AISecurity feature KEEPING UP WITH AI: OWASP LLM AI CYBERSECURITY AND GOVERNANCE CHECKLIST By Chris Hughes Mar 14, 2024 10 mins Generative AISecurity PracticesOpen Source View topic CYBERCRIME news ADMINISTRATOR OF RANSOMWARE OPERATION LOCKBIT NAMED, CHARGED, HAS ASSETS FROZEN By Lucian Constantin May 07, 2024 3 mins Advanced Persistent ThreatsHacker GroupsRansomware opinion WHAT IS THE DARK WEB? HOW TO ACCESS IT AND WHAT YOU’LL FIND By Darren Guccione Apr 02, 2024 13 mins Data BreachTechnology IndustryCybercrime news THE US INDICTS 7 CHINESE NATIONALS FOR CYBER ESPIONAGE By Sandeep Budki Mar 26, 2024 6 mins CyberattacksCybercrime View topic CAREERS feature AI GOVERNANCE AND CYBERSECURITY CERTIFICATIONS: ARE THEY WORTH IT? By Maria Korolov May 06, 2024 12 mins CertificationsIT Training Careers feature THE CSO GUIDE TO TOP SECURITY CONFERENCES By CSO Staff May 01, 2024 15 mins Technology IndustryIT SkillsEvents feature FINDING THE PERFECT MATCH: WHAT CISOS SHOULD ASK BEFORE SAYING ‘YES’ TO A JOB By Aimee Chanthadavong Apr 29, 2024 8 mins CSO and CISOCareers View topic IT LEADERSHIP feature SOME STRATEGIES FOR CISOS FREAKED OUT BY THE SPECTER OF FEDERAL INDICTMENTS By Cynthia Brumfield May 10, 2024 7 mins CSO and CISOLegalSecurity Practices interview STRONG CIO-CISO RELATIONS FUEL SUCCESS AT ALLY By Dan Roberts May 09, 2024 1 min CIOCSO and CISOIT Leadership feature WHAT IS IAM? IDENTITY AND ACCESS MANAGEMENT EXPLAINED By David Strom May 07, 2024 12 mins Identity Management SolutionsIT LeadershipSecurity View topic UPCOMING EVENTS 05/Jun virtual event FORWARDTECH VIRTUAL SHOWCASE Jun 05, 2024Virtual Event Technology Industry 18/Jun in-person event FUTUREIT CHICAGO: BUILDING THE DIGITAL BUSINESS WITH CLOUD, AI AND SECURITY Jun 18, 2024Chicago, IL Technology Industry 01/Jul in-person event SECUREIT NEW YORK 2024 Jul 01, 2024New York, NY Data and Information Security View all events IN DEPTH feature WHO OWNS YOUR DATA? SAAS CONTRACT SECURITY, PRIVACY RED FLAGS Companies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language. By Andrada Fiscutean Mar 27, 202410 mins Data and Information Security Read the Article PODCASTS podcastsSponsored by Microsoft Security STRENGTHEN AND STREAMLINE YOUR SECURITY This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity. 4 episodes Data and Information Security * Ep. 03 EPISODE 3: THE ZERO TRUST MODEL Mar 25, 202115 mins Multi-factor AuthenticationCSO and CISORemote Work * Ep. 04 EPISODE 4: REDUCE SOC BURNOUT Mar 29, 202115 mins CSO and CISOPhishingRemote Work SHOW ME MORE LatestArticlesPodcastsVideos feature DDOS ATTACKS: DEFINITION, EXAMPLES, AND TECHNIQUES By Josh Fruhlinger May 17, 202410 mins DDoSCyberattacks brandpost Sponsored by Palo Alto Networks HOW YOU MAY BE AFFECTED BY THE NEW PROPOSED CRITICAL INFRASTRUCTURE CYBER INCIDENT REPORTING RULE By Anand Oswal, Senior Vice President and GM of Network Security at Palo Alto Networks May 15, 20245 mins Security brandpost Sponsored by Sans Institute CLOCK IS TICKING FOR COMPANIES TO PREPARE FOR EU NIS2 DIRECTIVE May 15, 20243 mins Security podcast CSO EXECUTIVE SESSIONS: THE PERSONALITY OF CYBERSECURITY LEADERS Apr 29, 202419 mins CSO and CISO podcast CSO EXECUTIVE SESSIONS: GEOPOLITICAL TENSIONS IN THE SOUTH CHINA SEA – WHY THE PRIVATE SECTOR SHOULD CARE Apr 02, 202416 mins CSO and CISO podcast CSO EXECUTIVE SESSIONS: 2024 INTERNATIONAL WOMEN'S DAY SPECIAL Mar 13, 202410 mins CSO and CISO video CSO EXECUTIVE SESSIONS: THE PERSONALITY OF CYBERSECURITY LEADERS Apr 29, 202419 mins CSO and CISO video CSO EXECUTIVE SESSIONS: GEOPOLITICAL TENSIONS IN THE SOUTH CHINA SEA – WHY THE PRIVATE SECTOR SHOULD CARE Apr 01, 202416 mins CSO and CISO video CSO EXECUTIVE SESSIONS: 2024 INTERNATIONAL WOMEN'S DAY SPECIAL Mar 13, 202410 mins CSO and CISO Sponsored Links * Tomorrow’s cybersecurity success starts with next-level innovation today. Join the discussion now to sharpen your focus on risk and resilience. About * About Us * Advertise * Contact Us * Foundry Careers * Reprints * Newsletters * Brandposts Policies * Terms of Service * Privacy Policy * Cookie Policy * Copyright Notice * Member Preferences * About AdChoices * E-commerce Links * Your California Privacy Rights * Privacy Settings Our Network * CIO * Computerworld * Infoworld * Network World * LinkedIn * X * Facebook Copyright © 2024 IDG Communications, Inc. CSO WANTS TO SHOW YOU NOTIFICATIONS -------------------------------------------------------------------------------- YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER Accept Do not accept POWERED BY SUBSCRIBERS