News

CSO Online
csoonline. com > article > 4158673 > 4-questions-to-ask-before-outsourcing-mdr. html

4 questions to ask before outsourcing MDR

2+ hour, 10+ min ago  (608+ words) Security teams are stretched thin. Alerts never stop, attackers move faster, and expectations for uptime and resilience keep rising. For many IT and security leaders, Managed Detection and Response (MDR) has become less of a "nice to have" and more…...

CSO Online
csoonline. com > article > 4158679 > 5-trends-defining-the-future-of-ai-powered-cybersecurity. html

5 trends defining the future of AI-powered cybersecurity

2+ hour, 10+ min ago  (672+ words) The new N-able and Futurum Report reveals how AI is reshaping cyber resilience as it accelerates both business innovation and adversarial tradecraft. Attackers are scaling their operations with unprecedented speed, leveraging automation to bypass traditional defenses. For IT security leaders…...

CSO Online
csoonline. com > article > 4158560 > european-authorities-without-access-to-anthropics-ai-for-hacking. html

EU regulators largely denied access to Anthropic Mythos

10+ hour, 18+ min ago  (504+ words) European regulators have largely been frozen out of early access to Anthropic's new Mythos model, Politico reports. The AI technology, aimed at cybersecurity use cases, is said to be able to identify and exploit technical vulnerabilities at a level that…...

CSO Online
csoonline. com > article > 4094519 > from-code-to-boardroom-a-genai-grc-approach-to-supply-chain-risk. html

From code to boardroom: A Gen AI GRC approach to supply chain risk

4+ mon, 3+ week ago  (515+ words) I know the pressure chief information security officers face right now. We spent years hardening our own perimeter, then a few more managing the third-party vendor risk. Now, we are facing an existential threat from the fourth, fifth and nth…...

CSO Online
csoonline. com > uk > security-monitoring-software

Security Monitoring Software

1+ mon, 3+ week ago  (428+ words) | News, how-tos, features, reviews, and videos Cloud SIEMs are great until a "noisy neighbor" hogs all the resources. You need a vendor that actually engineers fairness so their spike doesn't break your security. Anomaly detection can be powerful in spotting…...

CSO Online
csoonline. com > article > 4133243 > a-new-approach-for-genai-risk-protection. html

A new approach for Gen AI risk protection

1+ mon, 3+ week ago  (270+ words) Before we jump into protection mode, we must first ask ourselves: "What is it we are trying to protect with Gen AI?" I see 3 primary objectives: 1) sensitive corporate data and intellectual property, 2) PII, PHI and 3) malware, maliciously generated code, etc....

CSO Online
csoonline. com > article > 4114020 > cisos-top-10-cybersecurity-priorities-for-2026. html

CISOs" top 10 cybersecurity priorities for 2026

3+ mon, 6+ day ago  (1626+ words) Cybersecurity threats are becoming more sophisticated, more automated, and more intelligent, as well as harder to detect. At the same time the enterprise attack surface CISOs are tasked to defend continues to expand. That's the reality security chiefs face in…...

CSO Online
csoonline. com > article > 4150554 > 5-critical-steps-to-achieve-business-resilience-in-cybersecurity. html

5 critical steps to achieve business resilience in cybersecurity

1+ week, 6+ day ago  (403+ words) What does it really take to keep your organization running when attackers strike? The answer is business resilience'being able to detect, contain, and recover fast enough that disruptions areminimized, customers stay confident, and operations keep moving." From the latest2026 State of…...

CSO Online
csoonline. com > article > 4115785 > top-10-vendors-for-ai-enabled-security-according-to-cisos. html

Top 10 vendors for AI-enabled security " according to CISOs

23+ hour, 17+ min ago  (429+ words) Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be sticking with tried-and-true, name-brand technology partners for their AI-enabled security needs. That's the key takeaway from CSO's 2025 Security Priorities Study, which collected responses from…...

CSO Online
csoonline. com > article > 4154222 > 6-ways-attackers-abuse-ai-services-to-hack-your-business. html

6 ways attackers abuse AI services to hack your business

1+ week, 1+ day ago  (1094+ words) Attackers are starting to exploit AI systems to mount attacks in the same way they once relied on built-in enterprise tools such as Power Shell. Instead of relying on malware, cybercriminals are increasingly abusing AI tools enterprises depend on " a…...