Latest from todayFeature7 top cybersecurity projects for 2026A new year brings both fresh and long-standing cyber challenges. The following innovative projects that CISOs are undertaking this year might be worth adding to your own 2026 planning list.By John EdwardsJan 19, 20267 minsEmail SecuritySecurity Operations CenterThreat and Vulnerability Management Opinion Cybersecurity at the edge: Securing rugged IoT in mission-critical environmentsBy Bhanu HandaJan 8, 20268 minsNetwork SecuritySecurity HardwareSecurity InfrastructureFeature 6 strategies for building a high-performance cybersecurity teamBy Mary K. PrattJan 6, 20269 minsIT LeadershipIT Skills and TrainingSecurity Operations Center NewsBattering RAM hardware hack breaks secure CPU enclavesBy John Leyden Dec 11, 20253 minsBlack HatCyberattacksSecurity Hardware AnalysisRecognizing and responding to cyber threats: What differentiates NDR, EDR and XDRBy Karl Heuser Nov 21, 20256 minsEndpoint ProtectionRisk ManagementSecurity Infrastructure BrandPostSponsored by NETSCOUTWhy SOC efficiency is the most valuable currency in cybersecurityBy NETSCOUT Nov 14, 20253 minsSecurity Operations Center Feature6 novel ways to use AI in cybersecurityBy John Edwards Sep 23, 20257 minsArtificial IntelligenceSecurity Infrastructure OpinionWhere CISOs need to see Splunk go nextBy Jon Oltsik Sep 18, 20257 minsNetwork SecuritySecurity InfrastructureTechnology Industry FeatureAI is altering entry-level cyber hiring — and the nature of the skills gapBy John Leyden Sep 18, 20257 minsHiringIT Skills and TrainingSecurity Infrastructure ArticlesnewsCrowdStrike bets big on agentic AI with new offerings after $290M Onum buyAt its Fal.Con conference, the cybersecurity giant launched its Agentic Security Platform and Agentic Security Workforce, aiming to outpace AI-driven adversaries with real-time intelligence, automation, and a common language for defense.By Cynthia Brumfield Sep 16, 2025 8 minsArtificial IntelligenceSecurity InfrastructureTechnology IndustryfeatureCISOs grapple with the realities of applying AI to security functionsViewed as a copilot to augment rather than revolutionize security operations, well-governed AI can deliver incremental results, according to security leaders’ early returns.By John Leyden Sep 16, 2025 6 minsArtificial IntelligenceSecurity InfrastructureSecurity PracticesopinionYour SOC is the parachute — Will it open?From alert fatigue to not relying on AI to know your systems, how to ensure your SOC is ready for current threats.By Dan Haagman Sep 15, 2025 5 minsArtificial IntelligenceSecurity InfrastructureSecurity Practicesfeature5 trends reshaping IT security strategies todayFrom market and financial pressures to the rise of AI, CISOs are getting agile with their security outlooks and roadmaps to contend with and keep in front of accelerating risks and disruptions. By Mary K. Pratt Sep 15, 2025 9 minsBudgetingIT StrategyRisk ManagementbrandpostSponsored by NETSCOUTWhy SOC efficiency is the most valuable currency in cybersecurityAs threats grow and resources shrink, efficiency is emerging as the SOC’s most critical force multiplier.By NETSCOUT Nov 14, 2025 3 minsSecurity Operations CenterfeatureHow AI is reshaping cybersecurity operationsAI’s emergence as a transformative force is spurring CISOs to rethink how their teams operate to harness the technology’s potential and better defend its use across the organization.By Mary K. Pratt Aug 25, 2025 10 minsIT Skills and TrainingIT StrategySecurity InfrastructurefeatureAgentic AI promises a cybersecurity revolution — with asterisksExperts say agentic AI will rapidly change cybersecurity, freeing up talent to focus on more dynamic work. But with AI agents still in their infancy, they also urge CISOs to ask a lot of questions before committing to this new security paradigm.By Cynthia Brumfield Aug 18, 2025 9 minsSecurity InfrastructureSecurity PracticesTechnology Industryanalysis7 reasons the SOC is in crisis — and 5 steps to fix itBreaches continue to happen as SOC analysts deal with too many alerts or rules of engagement that stops them from acting. Here are some of the common problems and how to fix them.By Dan Haagman Aug 14, 2025 11 minsIdentity and Access ManagementSecurity InfrastructureSecurity PracticesnewsReVault flaws let attackers bypass Windows login or place malware implants on Dell laptopsUpdate now: ControlVault3 firmware vulnerabilities undermine secure enclave technology.By John Leyden Aug 6, 2025 5 minsEventsSecurity InfrastructureVulnerabilitiesfeatureHow cybersecurity leaders are securing AI infrastructuresAI models, agentic frameworks, data pipelines, and all the tools, services, and open-source libraries that make AI possible are evolving quickly and cybersecurity leaders must be on top of it.By Maria Korolov Aug 6, 2025 10 minsArtificial IntelligenceGenerative AISecurity InfrastructurefeatureSkills gaps send CISOs in search of managed security providersUse of MSSPs is on the rise as CISOs contend with increased workloads, rising threats, and budget constraints, in addition to talent and training gaps.By John Leyden Jul 7, 2025 7 minsIT Skills and TrainingManaged Service ProvidersOutsourcingfeatureDownload the ‘AI-ready data centers’ spotlight reportIn this issue: There are lots of great reasons for running AI applications in your own data centers – provided they’re up to the task. AI puts new demands on virtually every aspect of data centers from servers and networks to power grids and more. Learn what it takes to build and run an AI-ready data center.By CSO Staff Jul 1, 2025 1 minCloud SecurityNetwork SecuritySecurity Infrastructurenews analysisPressure is mounting to cut jobs in favor of AI. Here’s why you shouldn’t.CISOs urged to resist AI job cut pressures and instead seek ways to employ the technology to unleash human creativity and alleviate burnout.By John Leyden Jun 26, 2025 5 minsIT JobsSecurity InfrastructureTechnology Industry Show more Show less View all Resources whitepaper Network Audit and Compliance Survival Guide As regulatory demands and cybersecurity threats continue to change and increase, enterprises face mounting pressure to maintain strict audit trails and prove continuous compliance across their complex network infrastructures. The post Network Audit and Compliance Survival Guide appeared first on Whitepaper Repository –. By Gluware 14 Jan 2026IT OperationsNetwork SecuritySecurity Infrastructure whitepaper A Proactive Approach to Generative AI for Cybersecurity By Google Cloud 09 Apr 2024Artificial IntelligenceSecurity InfrastructureSecurity Operations Center whitepaper Key Elements Enterprises Need to Include in Modern SecOps By Google Cloud 09 Apr 2024Cloud SecurityOtherSecurity InfrastructureSecurity Operations Center View all Podcasts podcastsCyber Sessions with Joan GoodchildCybersecurity is constantly evolving, and so are the leaders who shape it. Hosted by veteran journalist Joan Goodchild, Cyber Sessions brings candid conversations with top CISOs, strategists, and industry influencers. Each episode cuts through the noise to explore the trends, challenges, and leadership insights that define the future of security.6 episodesSecuritySecurity Practices Ep. 06 How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan Goodchild Jun 20, 202328 mins CyberattacksCybercrime Ep. 06 Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan Goodchild Jun 20, 202323 mins CybercrimeSmall and Medium Business Video on demand video CISO Reality: Record Pay, Rising Pressure, and Retention Risk In this edition of Cyber Sessions, host Joan Goodchild talks with IANS researcher Nick Kakolowski about why midmarket CISOs now earn record-high pay but are still are stretched thin by expanding responsibilities and limited resources. By Joan Goodchild Dec 10, 2025 27 minsCSO and CISOSecurity Infrastructure What is zero trust security? Sep 6, 2023 3 mins Access ControlNetwork SecurityZero Trust See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyView all topics Show me morePopularArticlesPodcastsVideos news SolarWinds WHD zero-days from January are under attack By John E. DunnFeb 10, 20263 mins IT ManagementVulnerabilitiesZero-Day Vulnerabilities news Windows shortcut weaponized in Phorpiex-linked ransomware campaign By Shweta SharmaFeb 10, 20264 mins CybercrimeMalwareRansomware news Single prompt breaks AI safety in 15 major language models By Gyana SwainFeb 10, 20266 mins Artificial IntelligenceGenerative AISecurity podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business podcast CSO Executive Session ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources