Latest from todayNewsBattling bots face off in cybersecurity arena Wiz creates an environment to test AI agents’ ability to identify cybersecurity problems. By Maxwell CooterFeb 13, 20262 minsAPIsCloud SecurityZero-Day Vulnerabilities News EU clears Google’s $32B Wiz acquisition, intensifying cloud security competitionBy Prasanth Aby ThomasFeb 11, 20264 minsCloud SecuritySecuritySecurity SoftwareNews From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chainBy Shweta SharmaFeb 3, 20265 minsArtificial IntelligenceCloud SecuritySecurity NewsMisconfigured demo environments are turning into cloud backdoors to the enterpriseBy Taryn Plumb Jan 21, 20266 minsCloud SecuritySecurityVulnerabilities News AnalysisSophisticated VoidLink malware framework targets Linux cloud serversBy Lucian Constantin Jan 14, 20265 minsCloud SecurityMalware Feature8 things CISOs can’t afford to get wrong in 2026By Bob Violino Jan 7, 202611 minsCSO and CISOCloud SecurityThreat and Vulnerability Management How-ToCASB buyer’s guide: What to know about cloud access security brokers before you buyBy Neal Weinberg and David Strom Dec 17, 202518 minsCloud SecurityEnterprise Buyer’s GuidesSecurity NewsGitHub Action Secrets aren’t secret anymore: exposed PATs now a direct path into cloud environmentsBy Taryn Plumb Dec 9, 20256 minsCloud SecurityGitHubSecurity OpinionRacks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you thinkBy Olatunde Olasehan Dec 9, 20258 minsBusiness ContinuityCloud SecuritySecurity ArticlesfeatureSpotlight: Making the most of multicloudFor IT leaders navigating multicloud environments, success depends on strategic alignment across business units, robust governance frameworks, and proactive security postures. While multicloud offers agility and vendor flexibility, it also introduces challenges in visibility, compliance, and developer productivity. In this special report, you’ll learn how to take advantage of the benefits of using multiple clouds, avoid common pitfalls, and ensure that multicloud is worth the investment. By CSO Staff Dec 9, 2025 1 minCloud SecurityEnterprise Buyer’s GuidesnewsCloudflare firewall reacts badly to React exploit mitigationIn attempting to fix one problem, Cloudflare caused another.By Peter Sayer Dec 5, 2025 3 minsCloud SecurityNetwork SecuritySecuritynewsMicrosoft Teams’ guest chat feature exposes cross-tenant blind spotAccepting a Teams guest invitation can drop users into an unprotected tenant, bypassing all Defender for Office 365 controls. By Shweta Sharma Nov 27, 2025 4 minsCloud SecuritySecurityVulnerabilitieshow-toCSPM buyer’s guide: How to choose the best cloud security posture management toolsWith hybrid multicloud environments becoming prevalent across all industries, it pays to invest in the right CSPM tools to minimize risk, protect cloud assets, and manage compliance.By Linda Rosencrance and David Strom Nov 27, 2025 11 minsCloud SecurityData and Information SecurityThreat and Vulnerability ManagementbrandpostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 2025 5 minsCloud SecurityCyberattacksCybercrimenewsFluent Bit vulnerabilities could enable full cloud takeoverFlaws in Fluent Bit could let attackers inject fake logs, reroute telemetry, and execute arbitrary code across cloud platforms.By Shweta Sharma Nov 25, 2025 4 minsCloud SecuritySecurityVulnerabilitiesnewsRansomware gangs seize a new hostage: your AWS S3 bucketsAttackers are moving beyond on-prem systems and now using AWS’s own encryption and key management features to lock organizations out of their cloud data.By Shweta Sharma Nov 21, 2025 4 minsCloud SecurityMalwareRansomwarefeatureThe security leaders who turned their frustrations into companiesFormer CISOs share their experience after successfully founding security companies. CSO spoke to Paul Hadjy, Joe Silva, Chris Pierson and Michael Coates.By Jaikumar Vijayan Nov 12, 2025 15 minsCloud SecurityNetwork SecurityThreat and Vulnerability ManagementfeatureWhy can't enterprises get a handle on the cloud misconfiguration problem?Cloud configuration errors still plague enterprises. More SaaS tools connected across different cloud environments and a lack of out-of-the-box security controls are some of the issues.By Maria Korolov Nov 7, 2025 9 minsCloud SecuritySecuritynews analysisSalesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft DriftSalesforce failed to address the massive wave of OAuth breaches at its Dreamforce conference, but securing third-party authentication is paramount for the agentic future it seeks.By Maria Korolov Oct 22, 2025 10 minsAccess ControlAuthenticationData BreachopinionIntroducing MAESTRO: A framework for securing generative and agentic AIAI’s moving too fast for old rules — MAESTRO gives banks a smarter, layered way to secure next-gen generative and agentic AI systems.By Sina Manavi Oct 15, 2025 10 minsBankingCloud SecurityFinancial Services IndustryopinionDull but dangerous: A guide to 15 overlooked cybersecurity blind spotsIt’s not the fancy hacks that get you — it’s the boring stuff you forgot to patch. Here are 15 sneaky blind spots that could wreck your defenses.By Maman Ibrahim Oct 13, 2025 10 minsCloud SecurityNetwork SecurityVulnerabilitieshow-toWhat to look for in a data protection platform for hybrid cloudsTo safeguard enterprise data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention (DLP), secure web gateways (SWGs), and cloud-access security brokers (CASBs). But such security is just the start; they also need data protection beyond security. By Neal Weinberg Oct 13, 2025 13 minsCloud SecurityData and Information SecuritySecurity Show more Show less View all Resources whitepaper Cloud Security – Are You in Control or Just in the Cloud? Your data is in the cloud – but who really holds the keys? Discover how leading organizations are taking back control. The post Cloud Security – Are You in Control or Just in the Cloud? appeared first on Whitepaper Repository –. By Thales 26 Jun 2025Cloud NativeCloud SecurityHybrid Cloud View all Video on demand video Honeypots and the evolution of botnets | Salted Hash Ep 23 Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsApplication SecurityFirewalls DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 8, 2018 21 mins Application SecurityData BreachHacking Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 mins Cloud ComputingCloud SecuritySecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards Jul 20, 2017 41 mins AppleCloud SecuritySmartphones See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos news Trump’s cyber strategy emphasizes offensive operations, deregulation, AI By Cynthia BrumfieldMar 6, 20266 mins GovernmentGovernment ITSecurity news ClickFix attackers using new tactic to evade detection, says Microsoft By Howard SolomonMar 6, 20265 mins MalwarePhishingSocial Engineering news Only 30 minutes per quarter on cyber risk: Why CISO-board conversations are falling short By Taryn PlumbMar 6, 20266 mins BusinessCSO and CISOEnterprise podcast CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CyberattacksCybercrimeRansomware podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: From Compliance to Cyber Resilience-Securing Patient Trust in Southeast Asia’s Hospitals By Estelle QuekFeb 24, 202623 mins CSO and CISOElectronic Health RecordsRansomware video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business