www.csoonline.com Open in urlscan Pro
151.101.2.165  Public Scan

Submitted URL: https://gehriger.ch/
Effective URL: https://www.csoonline.com/
Submission: On May 18 via api from CH — Scanned from CH

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="suchen" aria-label="suchen" id="gsc-i-id1"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;" dir="ltr" spellcheck="false"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Suchfeldeingaben löschen" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>suchen</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="Ergebnisse löschen">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

 * Topics
 * Events
 * Newsletters
 * Resources
 * Community




ABOUT

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters


POLICIES

 * Terms of Service
 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights


OUR NETWORK

 * CIO
 * Computerworld
 * InfoWorld
 * Network World


MORE

 * Awards
 * Blogs
 * BrandPosts
 * Events
 * Podcasts
 * Videos
 * Enterprise Buyer’s Guides

Close
 * Artificial Intelligence
 * Generative AI
 * Business Operations
 * Careers
 * Industry
 * IT Leadership
 * Compliance
 * Security
 * Application Security
 * Business Continuity
 * Cloud Security

 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security Infrastructure
 * Vulnerabilities
 * Software Development
 * Enterprise Buyer’s Guides

Back
Close


AMERICAS

 * United States


ASIA

 * ASEAN
 * India


EUROPE

 * United Kingdom


OCEANIA

 * Australia

Back
Close
×

suchen
 

Popular Topics

 * Search
 * US-EN

 * Topics
 * Events
 * Newsletters
 * Resources
 * Community
 * About
 * Policies
 * Our Network
 * More

Back


TOPICS

 * Artificial Intelligence
 * Generative AI
 * Business Operations
 * Careers
 * Industry
 * IT Leadership
 * Compliance
 * Security
 * Application Security
 * Business Continuity
 * Cloud Security
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security Infrastructure
 * Vulnerabilities
 * Software Development
 * Enterprise Buyer’s Guides

Back


ABOUT

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters

Back


POLICIES

 * Terms of Service
 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights

Back


OUR NETWORK

 * CIO
 * Computerworld
 * InfoWorld
 * Network World

Back


MORE

 * Awards
 * Blogs
 * BrandPosts
 * Events
 * Podcasts
 * Videos
 * Enterprise Buyer’s Guides



news analysis


SEC RULE FOR FINANCE FIRMS BOOSTS DISCLOSURE REQUIREMENTS

Amendments to Regulation S-P requires broker-dealers, investment companies,
registered investment advisers, and transfer agents to disclose incidents to
customers.

By Evan Schuman
May 17, 20245 mins
Data BreachFinancial Services IndustryData Privacy
feature


CYBER RESILIENCE: A BUSINESS IMPERATIVE CISOS MUST GET RIGHT

By Andrada Fiscutean
May 16, 202412 mins
CSO and CISORegulationIncident Response
feature


BACKLOGS AT NATIONAL VULNERABILITY DATABASE PROMPT ACTION FROM NIST AND CISA

By John Mello Jr.
May 15, 202410 mins
Threat and Vulnerability ManagementSecurity PracticesVulnerabilities
news

US AI EXPERTS TARGETED IN CYBERESPIONAGE USING SUGARGH0ST RAT

By Lucian Constantin
May 16, 20244 mins
PhishingData and Information Security
news

BREACHFORUMS SEIZED BY LAW ENFORCEMENT, ADMIN BAPHOMET ARRESTED

By Shweta Sharma
May 16, 20244 mins
Data BreachCybercrime
news analysis

MICROSOFT FIXES THREE ZERO-DAY VULNERABILITIES, TWO ACTIVELY EXPLOITED

By Lucian Constantin
May 15, 20246 mins
Windows SecurityZero-day vulnerability
news

SINGING RIVER RANSOMWARE ATTACK NOW THOUGHT TO HAVE AFFECTED OVER 895,000

By Shweta Sharma
May 15, 20244 mins
Data BreachRansomware
feature

LOW-TECH TACTICS STILL TOP THE IT SECURITY RISK CHART

By Rosalyn Page
May 14, 20249 mins
CyberattacksSocial EngineeringData and Information Security
news

EQUIPPED WITH AI TOOLS, HACKERS MAKE APPS RISKIER THAN EVER

By Shweta Sharma
May 14, 20244 mins
Application Security



MORE SECURITY NEWS

news

FCC PROPOSES BGP SECURITY MEASURES

Protecting the Border Gateway Protocol is as important as protecting the border.

By Gyana Swain
May 17, 2024 1 min
RegulationNetwork Security
news

CYCODE ROLLS OUT ASPM CONNECTOR MARKETPLACE, ANALYSTS SEE IT AS BARE MINIMUM

Application security posture management tools need to integrate with other
security tools to do their job.

By Evan Schuman
May 16, 2024 4 mins
Application Security
news

BLACK BASTA RANSOMWARE IMPACTED OVER 500 ORGANIZATIONS WORLDWIDE

CISA advisory includes indicators of compromise and TTPs that can be used for
threat hunting.

By Lucian Constantin
May 14, 2024 6 mins
RansomwarePhishingHealthcare Industry
news

INTELBROKER STEALS CLASSIFIED DATA FROM THE EUROPOL WEBSITE

The agency said core operations remain unaffected even as IntelBroker claimed to
possess classified, law enforcement data.

By Shweta Sharma
May 13, 2024 3 mins
Data BreachHacker Groups
news

CISA INKS 68 TECH VENDORS TO SECURE-BY-DESIGN PLEDGE — BUT WILL IT MATTER?

CISA’s pledge drew some big names, but the impact on software security could be
limited. Meanwhile the org has extended its comment period on the CIRCIA
cyberattack reporting law.

By Jon Gold
May 10, 2024 4 mins
RegulationTechnology IndustrySecurity Practices
news

GOOGLE CHROME GETS A PATCH FOR ACTIVELY EXPLOITED ZERO-DAY VULNERABILITY

Details of the use-after-free memory vulnerability were not publicly released,
but Google says it’s aware an exploit for the bug exists.

By Lucian Constantin
May 10, 2024 3 mins
Threat and Vulnerability ManagementZero-day vulnerabilityVulnerabilities
news

DELL DATA BREACH EXPOSES DATA OF 49 MILLION CUSTOMERS

The company says the breach compromised non-critical customer data and involved
no sensitive personal or financial information.

By Shweta Sharma
May 10, 2024 3 mins
Data BreachHacking
news

ZSCALER SHUTS DOWN EXPOSED SYSTEM AFTER RUMORS OF A CYBERATTACK

Initially dismissing rumors, Zscaler now says it did have a system exposed but
nothing important has been accessed.

By Shweta Sharma
May 09, 2024 3 mins
Data BreachCyberattacks
news

PALO ALTO LAUNCHES AI-POWERED SOLUTIONS TO FIGHT AI-GENERATED CYBERTHREATS

The suite is powered by Palo Alto’s proprietary solution, Precision AI, which
integrates machine learning, deep learning, and generative AI technologies.

By Prasanth Aby Thomas
May 09, 2024 3 mins
Generative AISecurity Software
news

F5 PATCHES BIG-IP NEXT CENTRAL MANAGER FLAWS THAT COULD LEAD TO DEVICE TAKEOVER

Two high-risk vulnerabilities could allow attackers to gain full administrative
control on devices via leaked password hashes.

By Lucian Constantin
May 08, 2024 5 mins
Threat and Vulnerability ManagementCloud SecurityVulnerabilities
news

SUSPECTED CHINESE HACK OF BRITAIN’S MINISTRY OF DEFENCE LINKED TO CONTRACTOR,
MINISTER CONFIRMS

The UK’s defence minister would not confirm that the attack was conducted by an
element of the Chinese state, rather blaming the “potential failings” of a
partner.

By John Dunn
May 08, 2024 4 mins
Aerospace and Defense IndustryData BreachGovernment
news analysis

MASSIVE SECURITY HOLE IN VPNS SHOWS THEIR SHORTCOMINGS AS A DEFENSIVE MEASURE

Researchers found a deep, unpatchable flaw in virtual private networks dubbed
Tunnelvision can allow attackers to siphon off data without any indication that
they are there.

By Evan Schuman
May 08, 2024 8 mins
Threat and Vulnerability ManagementData and Information SecurityNetwork Security
Show more
Show less


EXPLORE A TOPIC



 * Generative AI
 * Application Security
 * Business Continuity
 * Business Operations
 * Careers
 * Cloud Security
 * Compliance
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Industry
 * IT Leadership
 * Network Security
 * Physical Security
 * View all topics


ALL TOPICS

Close
 * Generative AI
 * Application Security
 * Business Continuity
 * Business Operations
 * Careers
 * Cloud Security
 * Compliance
 * Critical Infrastructure
 * Cybercrime
 * Identity and Access Management
 * Industry
 * IT Leadership
 * Network Security
 * Physical Security
 * Privacy
 * Risk Management
 * Security
 * Security Infrastructure
 * Software Development
 * Vulnerabilities


POPULAR TOPICS


GENERATIVE AI

news


SECURITI ADDS DISTRIBUTED LLM FIREWALLS TO SECURE GENAI APPLICATIONS

By Shweta Sharma
Apr 30, 2024 4 mins
Generative AI
news

TOP CYBERSECURITY PRODUCT NEWS OF THE WEEK

By CSO staff
Apr 26, 2024 81 mins
Generative AISecurity
feature

KEEPING UP WITH AI: OWASP LLM AI CYBERSECURITY AND GOVERNANCE CHECKLIST

By Chris Hughes
Mar 14, 2024 10 mins
Generative AISecurity PracticesOpen Source
View topic


CYBERCRIME

news


ADMINISTRATOR OF RANSOMWARE OPERATION LOCKBIT NAMED, CHARGED, HAS ASSETS FROZEN

By Lucian Constantin
May 07, 2024 3 mins
Advanced Persistent ThreatsHacker GroupsRansomware
opinion

WHAT IS THE DARK WEB? HOW TO ACCESS IT AND WHAT YOU’LL FIND

By Darren Guccione
Apr 02, 2024 13 mins
Data BreachTechnology IndustryCybercrime
news

THE US INDICTS 7 CHINESE NATIONALS FOR CYBER ESPIONAGE

By Sandeep Budki
Mar 26, 2024 6 mins
CyberattacksCybercrime
View topic


CAREERS

feature


AI GOVERNANCE AND CYBERSECURITY CERTIFICATIONS: ARE THEY WORTH IT?

By Maria Korolov
May 06, 2024 12 mins
CertificationsIT Training Careers
feature

THE CSO GUIDE TO TOP SECURITY CONFERENCES

By CSO Staff
May 01, 2024 15 mins
Technology IndustryIT SkillsEvents
feature

FINDING THE PERFECT MATCH: WHAT CISOS SHOULD ASK BEFORE SAYING ‘YES’ TO A JOB

By Aimee Chanthadavong
Apr 29, 2024 8 mins
CSO and CISOCareers
View topic


IT LEADERSHIP

feature


SOME STRATEGIES FOR CISOS FREAKED OUT BY THE SPECTER OF FEDERAL INDICTMENTS

By Cynthia Brumfield
May 10, 2024 7 mins
CSO and CISOLegalSecurity Practices
interview

STRONG CIO-CISO RELATIONS FUEL SUCCESS AT ALLY

By Dan Roberts
May 09, 2024 1 min
CIOCSO and CISOIT Leadership
feature

WHAT IS IAM? IDENTITY AND ACCESS MANAGEMENT EXPLAINED

By David Strom
May 07, 2024 12 mins
Identity Management SolutionsIT LeadershipSecurity
View topic



UPCOMING EVENTS

05/Jun

virtual event

FORWARDTECH VIRTUAL SHOWCASE

Jun 05, 2024Virtual Event
Technology Industry
18/Jun

in-person event

FUTUREIT CHICAGO: BUILDING THE DIGITAL BUSINESS WITH CLOUD, AI AND SECURITY

Jun 18, 2024Chicago, IL
Technology Industry
01/Jul

in-person event

SECUREIT NEW YORK 2024

Jul 01, 2024New York, NY
Data and Information Security
View all events


IN DEPTH

feature

WHO OWNS YOUR DATA? SAAS CONTRACT SECURITY, PRIVACY RED FLAGS

Companies looking to use SaaS solutions should involve the security team in the
procurement process and pay attention to contract language.

By Andrada Fiscutean
Mar 27, 202410 mins
Data and Information Security
Read the Article




PODCASTS

podcastsSponsored by Microsoft Security

STRENGTHEN AND STREAMLINE YOUR SECURITY

This podcast series brought to you by Microsoft and IDG, will explore the core
components of a modern security strategy, with insights and tips from leading
security experts. We’ll discuss how ongoing and ever-changing threats, a growing
security stack, and a shift to remote work make it difficult for CISOs and their
security teams to balance enterprise-grade security with end-user productivity.

4 episodes
Data and Information Security
 * Ep. 03
   
   EPISODE 3: THE ZERO TRUST MODEL
   
   Mar 25, 202115 mins
   Multi-factor AuthenticationCSO and CISORemote Work
 * Ep. 04
   
   EPISODE 4: REDUCE SOC BURNOUT
   
   Mar 29, 202115 mins
   CSO and CISOPhishingRemote Work



SHOW ME MORE

LatestArticlesPodcastsVideos
feature

DDOS ATTACKS: DEFINITION, EXAMPLES, AND TECHNIQUES

By Josh Fruhlinger
May 17, 202410 mins
DDoSCyberattacks

brandpost Sponsored by Palo Alto Networks

HOW YOU MAY BE AFFECTED BY THE NEW PROPOSED CRITICAL INFRASTRUCTURE CYBER
INCIDENT REPORTING RULE

By Anand Oswal, Senior Vice President and GM of Network Security at Palo Alto
Networks
May 15, 20245 mins
Security

brandpost Sponsored by Sans Institute

CLOCK IS TICKING FOR COMPANIES TO PREPARE FOR EU NIS2 DIRECTIVE


May 15, 20243 mins
Security

podcast

CSO EXECUTIVE SESSIONS: THE PERSONALITY OF CYBERSECURITY LEADERS


Apr 29, 202419 mins
CSO and CISO

podcast

CSO EXECUTIVE SESSIONS: GEOPOLITICAL TENSIONS IN THE SOUTH CHINA SEA – WHY THE
PRIVATE SECTOR SHOULD CARE


Apr 02, 202416 mins
CSO and CISO

podcast

CSO EXECUTIVE SESSIONS: 2024 INTERNATIONAL WOMEN'S DAY SPECIAL


Mar 13, 202410 mins
CSO and CISO

video

CSO EXECUTIVE SESSIONS: THE PERSONALITY OF CYBERSECURITY LEADERS


Apr 29, 202419 mins
CSO and CISO

video

CSO EXECUTIVE SESSIONS: GEOPOLITICAL TENSIONS IN THE SOUTH CHINA SEA – WHY THE
PRIVATE SECTOR SHOULD CARE


Apr 01, 202416 mins
CSO and CISO

video

CSO EXECUTIVE SESSIONS: 2024 INTERNATIONAL WOMEN'S DAY SPECIAL


Mar 13, 202410 mins
CSO and CISO


Sponsored Links

 * Tomorrow’s cybersecurity success starts with next-level innovation today.
   Join the discussion now to sharpen your focus on risk and resilience.

About

 * About Us
 * Advertise
 * Contact Us
 * Foundry Careers
 * Reprints
 * Newsletters
 * Brandposts

Policies

 * Terms of Service
 * Privacy Policy
 * Cookie Policy
 * Copyright Notice
 * Member Preferences
 * About AdChoices
 * E-commerce Links
 * Your California Privacy Rights
 * Privacy Settings

Our Network

 * CIO
 * Computerworld
 * Infoworld
 * Network World


 * LinkedIn
 * X
 * Facebook

Copyright © 2024 IDG Communications, Inc.











CSO WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS