Latest from todayOpinionInvisible battles: How cybersecurity work erodes mental health in silenceCyber pros are burning out in the shadows, proving you can’t secure the business if you don’t take care of the humans behind the screens.By Maman IbrahimNov 24, 20258 minsBurnoutEmployee ExperienceHuman Resources Opinion From code to boardroom: A GenAI GRC approach to supply chain riskBy Adetunji AdebayoNov 21, 20257 minsGenerative AIIT GovernanceRisk ManagementNews Google asks US court to shut down Lighthouse phishing-as-a-service operationBy Howard SolomonNov 12, 20256 minsCybercrimePhishingSocial Engineering FeatureModern supply-chain attacks and their real-world impactBy Ax Sharma Nov 4, 202510 minsCyberattacksCybercrimeMalware News AnalysisUS Appeals Court lowers burden of proof for data breach lawsuitsBy Evan Schuman Nov 3, 20255 minsCyberattacksCybercrimeData Breach News Analysis71% of CISOs hit with third-party security incident this yearBy John Leyden Sep 9, 20256 minsCyberattacksCybercrimeData Breach News AnalysisAttackers steal data from Salesforce instances via compromised AI live chat toolBy Lucian Constantin Aug 26, 20255 minsAccess ControlApplication SecuritySupply Chain NewsSupply chain attack compromises npm packages to spread backdoor malware By John E. Dunn Jul 24, 20255 minsMalwareOpen SourceSupply Chain FeatureCybersecurity in the supply chain: strategies for managing fourth-party risksBy Linda Rosencrance Jul 4, 20259 minsIT GovernanceSecuritySupply Chain ArticlesnewsUS indicts one for role in BreachForums, France arrests four othersA US court has indicted a man arrested earlier this year on suspicion of being an administrator of stolen data marketplace BreachForum, while on Monday French police arrested four others suspected of running the site.By Shweta Sharma Jun 26, 2025 4 minsData BreachHackingLegalnewsChain IQ data theft highlights need to oversee third party suppliersFirm says hack on 19 companies came from ‘tools and techniques that had never before been seen on a global scale.’By Howard Solomon Jun 19, 2025 5 minsData BreachSupply Chainfeature4 ways to safeguard CISO communications from legal liabilitiesThe SEC’s lawsuit against SolarWinds’ CISO highlights the legal liabilities CISOs can face when communicating. Here are four ways CISOs can avoid the pitfalls.By Cynthia Brumfield May 20, 2025 9 minsCSO and CISOLaws and RegulationsLegalfeatureIs HR running your employee security training? Here’s why that’s not always the best ideaTraining employees to resist the lure of phishing, scams, and deepfakes is central to a good cybersecurity posture, but to be effective it needs to be handled with plenty of input and guidance from the security team.By Linda Rosencrance Apr 9, 2025 9 minsCSO and CISOHuman ResourcesIT Skills and TrainingbrandpostSponsored by Palo Alto NetworksSecuring Your Cloud Supply ChainCloud supply chain security can be managed with a four-step strategic approach, learn more here. By Matt Chiodi Aug 25, 2022 5 minsIT LeadershipSupply ChainopinionWhy DEI is key for a cyber safe futureDiversity, equity, and inclusion (DEI) can be a cyber superpower — not just for reducing security skills gaps but for ensuring cybersecurity teams make defenses stronger and more adaptive.By Bridget Chan, Camille Stewart Gloster and Katelyn Ringrose Apr 8, 2025 5 minsCybercrimeDiversity and InclusionHuman ResourcesfeatureVeterans are an obvious fit for cybersecurity, but tailored support ensures they succeedPaying attention to the specific needs of military members transitioning to civilian security positions can help organizations improve their recruitment and retention, and the process can benefit hiring programs in general.By Mary K. Pratt Apr 3, 2025 9 minsHiringHuman ResourcesMilitaryfeatureCISOs are taking on ever more responsibilities and functional roles – has it gone too far?Shifting regulatory and compliance landscapes and the widespread adoption of AI have heightened demand for cybersecurity leaders to step outside the technical, but more responsibility can come with a price.By Mary K. Pratt Mar 24, 2025 13 minsCSO and CISOHuman ResourcesIT JobsfeatureHow CISOs are approaching staffing diversity with DEI initiatives under pressureDespite a seismic shift in government attitudes to diversity, equity, and inclusion policies, many cybersecurity leaders maintain that a diverse workforce comes with many benefits.By Linda Rosencrance Mar 20, 2025 9 minsCSO and CISOHuman ResourcesIT LeadershipopinionThe cybersecurity product sales process is broken, but it doesn’t have to beThe relationship between CISOs and vendors is fraught with problems that result in a deeply flawed procurement process – by working together, vendors and CISOs can create a better way forward.By Tyler Farrar Mar 12, 2025 6 minsBusiness IT AlignmentBusiness Process ManagementCSO and CISOfeatureStrategic? Functional? Tactical? Which type of CISO are you?Research shows various ways to classify CISOs based on role expectations, strengths and experience – distinctions that matter when it comes to ensuring that security leaders land in jobs where they will succeed.By Mary K. Pratt Feb 24, 2025 9 minsCSO and CISOHuman ResourcesSecurity PracticesfeatureManaging the emotional toll cybersecurity incidents can take on your teamAddressing the psychic pain suffered by cybersecurity team members during major incidents is crucial for security leaders. Experts recommend several measures that can lessen the psychological strain.By Cynthia Brumfield Feb 21, 2025 11 minsCSO and CISOHuman ResourcesSecurity PracticesopinionThink being CISO of a cybersecurity vendor is easy? Think againMaking the shift from a security product developer to the same role at an enterprise taught made one CISO more prepared, more aware, and more capable of tackling new challenges.By Tyler Farrar Feb 19, 2025 7 minsCSO and CISOHuman ResourcesIT Leadership Show more Show less View all Resources whitepaper Redefining resilience for the future of work. Innovation is accelerating and new work models are emerging: 69% of IT leaders are prioritizing digital transformation and AI over cybersecurity and cloud and data management in the next year The post Redefining resilience for the future of work. appeared first on Whitepaper Repository –. By HP Inc 09 Dec 2025Artificial IntelligenceBusiness OperationsDigital Transformation whitepaper Mastering IT in an Era of Transformation By HP Inc 09 Dec 2025Artificial IntelligenceBusiness OperationsIT Operations whitepaper Infographic: Supercharge AI performance and enhance productivity with the HP EliteBook X G1a 14 inch Notebook Next Gen AI PC By HP Inc 05 Dec 2025Artificial IntelligenceBusiness OperationsDigital Transformation View all Explore a topicApplication SecurityBusiness ContinuityCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on news Making cybercrime illegal won't stop it; making cybersec research legal may By Maxwell CooterDec 10, 20255 mins CybercrimeGovernmentIndustry podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management