CSOonline
@csoonline.bsky.social
89 followers 22 following 220 posts
CSO empowers enterprise security leaders with critical insights to stay ahead of threats. Covering #cybersecurity from #riskmanagement to #networkdefense, we provide the expertise needed to defend against cybercrime.
Posts Media Videos Starter Packs
Quantum attacks won’t announce themselves. By the time they hit, it’s game over. The only defense is getting quantum-ready now.

Full story by #FoundryExpert Contributor, Mike Wilkes: spr.ly/63324A2qfn

#Encryption
#ThreatandVulnerabilityManagement
AI’s moving too fast for old rules — MAESTRO gives banks a smarter, layered way to secure next-gen generative and agentic AI systems.

Catch the full write-up by #FoundryExpert Contributor, Sina Manavi here: spr.ly/63324AF2sa

#Banking
#CloudSecurity
#FinancialServicesIndustry
Checklists won’t cut it anymore — AI moves too fast. GRC needs to adapt in real time, understand AI’s intent and keep humans in the loop.

Get expert perspective from #FoundryExpert Contributor, Adetunji Adebayo here: spr.ly/63322AF2w8

#Compliance
#ITGovernance
#RiskManagement
Customers of F5 Networks are advised to patch their devices immediately and be alert for suspicious activity after the company said in a regulatory filing that a threat actor stole some source code for its BIG-IP products. www.csoonline.com/article/4073...
Source code and vulnerability info stolen from F5 Networks
IT and security leaders should install latest patches from the application delivery and security vendor after suspected nation-state hack.
www.csoonline.com
AI is no longer experimental—58% of orgs plan to boost spending on AI security tools in 2025.
Hear insights at the CSO Conference, Oct 20–22 at Grand Hyatt Indian Wells.

Read the article by Joan Goodchild for CSO events: spr.ly/63322AFpc6

#CSOConference #CybersecurityLeadership
Security teams are racing to combat AI-driven attacks with more sophisticated tools and enhanced control over their own AI.

Don’t miss the full story from #FoundryExpert Contributor, Rick Grinell: spr.ly/63328A0GOg

#CloudSecurity
#Cyberattacks
#NetworkSecurity
Today's rapidly changing environment demands a fresh mindset, one that challenges long-held assumptions about what keeps organizations secure. Security experts weigh in on the myths that we finally need to retire. www.csoonline.com/article/5719...
13 cybersecurity myths organizations need to stop believing
Security teams trying to defend their organizations need to adapt quickly to new challenges. Yesterday's best practices have become today's myths.
www.csoonline.com
Last week, the extortion supergroup had its dark web and clearnet domains seized by police, the latest setback to befall the alliance that had threatened to release Salesforce data allegedly stolen from 39 companies in a mass social engineering attack.

www.csoonline.com/article/4072...
Scattered Lapsus$ Hunters extortion site goes dark: What’s next?
Group leaks data stolen from small subset of the 39 companies it threatened last week.
www.csoonline.com
AI’s biggest dangers aren’t sci-fi — they’re here now. Paul Dongha shares how CISOs can spot red flags and keep AI use ethical and accountable.

Catch the full interview by #FoundryExpert Contributor, Tabish Ali here: spr.ly/63320AIF78

#ArtificialIntelligence
#GenerativeAI
Resilience fails in the seams: tiny misconfigurations, forgotten defaults and silent drifts that escape the spotlight but magnify blast radius when things go wrong.

Opinion from #FoundryExpert Contributor, Maman Ibrahim: spr.ly/63328AI02E

#CloudSecurity
#NetworkSecurity

For decades, cybersecurity was about securing static assets — servers, endpoints and code. Even complex modern software is typically deterministic; it follows clear, predefined rules.

See what #FoundryExpert Contributor Ritu Jyoti has to say: spr.ly/63320AIqPi

#CloudSecurity
Strong cyber programs aren’t built on tech alone — they thrive when architecture, risk and culture work together.

Get the full story by #FoundryExpert contributor, Rangel Rodrigues here: spr.ly/63328As20j

#RiskManagement #DataSecurity #informationsecurity
Three of the most notorious ransomware-as-a-service operations have formed a criminal cartel aimed at coordinating attacks and sharing resources in what they describe as an increasingly “challenging” ransomware business environment. www.csoonline.com/article/4070...
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
The alliance aims to coordinate attacks and share resources as law enforcement pressure mounts.
www.csoonline.com
Hundreds of workers within CISA, who were engaged in issuing alerts about threats against US agencies and critical infrastructure, have been shuffled and reassigned to agencies such as ICE, Customs and Border Protection, and the Federal Protective Service www.csoonline.com/article/4070...
Homeland Security’s reassignment of CISA staff leaves US networks exposed
As the DHS moves some CISA staff to immigration and border roles, experts warn of slower threat detection, delayed advisories, and rising risks for both federal and enterprise systems.
www.csoonline.com
AI agents are getting better at all phases of cyberattacks, faster than most of us expected. They can chain together different aspects of a cyber operation, and hack autonomously, at computer speeds and scale. This is going to change everything.
www.csoonline.com/article/4069...
Autonomous AI hacking and the future of cybersecurity
AI agents are automating key parts of the attack chain, threatening to tip the scales completely in favor of cyber attackers unless new models of AI-assisted cyberdefense arise.
www.csoonline.com
The popular Redis in-memory data store received a patch for a critical vulnerability that leads to remote code execution. The flaw requires authentication to exploit, but many instances don’t have authentication configured and around 60,000 of them are exposed.

www.csoonline.com/article/4069...
10.0-severity RCE flaw puts 60,000 Redis instances at risk
The critical vulnerability allows attacks to escape the in-memory data store’s Lua sandbox and subsequently execute arbitrary code on the underlying server.
www.csoonline.com
AI isn’t replacing your SOC team — it’s supercharging them, turning endless alerts into smart, proactive defenses against real threats.

Don't miss this insightful opinion piece by #FoundryExpert contributor, Ritu Jyoti spr.ly/63328AolMy

#NetworkSecurity
#SecurityOperationsCenter