Editor's picksFeatureSpotlight: Making the most of multicloudFor IT leaders navigating multicloud environments, success depends on strategic alignment across business units, robust governance frameworks, and proactive security postures. While multicloud offers agility and vendor flexibility, it also introduces challenges in visibility, compliance, and developer productivity. In this special report, you’ll learn how to take advantage of the benefits of using multiple clouds, avoid common pitfalls, and ensure that multicloud is worth the investment. By CSO StaffDec 9, 20251 minCloud SecurityEnterprise Buyer’s Guides How-To CSPM buyer’s guide: How to choose the best cloud security posture management toolsBy Linda Rosencrance and David StromNov 27, 202511 minsCloud SecurityData and Information SecurityThreat and Vulnerability ManagementNews Ransomware gangs seize a new hostage: your AWS S3 bucketsBy Shweta SharmaNov 21, 20254 minsCloud SecurityMalwareRansomware FeatureWhy can't enterprises get a handle on the cloud misconfiguration problem?By Maria Korolov Nov 7, 20259 minsCloud SecuritySecurity How-ToWhat to look for in a data protection platform for hybrid cloudsBy Neal Weinberg Oct 13, 202513 minsCloud SecurityData and Information SecuritySecurity NewsCloud Security Alliance launches framework to improve SaaS securityBy John Leyden Sep 25, 20254 minsCloud SecurityRisk ManagementSecurity NewsEntra ID vulnerability exposes gaps in cloud identity trust models, experts warnBy Shweta Sharma Sep 19, 20255 minsCloud SecuritySecurityVulnerabilities Feature5 multicloud security challenges — and how to address themBy Mary K. Pratt Jul 3, 20259 minsCloud Security FeatureHow to make your multicloud security more effectiveBy David Strom Jun 26, 20258 minsCloud Security Latest from todayNewsGitHub Action Secrets aren’t secret anymore: exposed PATs now a direct path into cloud environmentsWiz has found threat actors exploiting GitHub tokens, giving them access to GitHub Action Secrets and, ultimately, cloud environments. By Taryn PlumbDec 9, 20256 minsCloud SecurityGitHubSecurity Opinion Racks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you thinkBy Olatunde OlasehanDec 9, 20258 minsBusiness ContinuityCloud SecuritySecurityNews Cloudflare firewall reacts badly to React exploit mitigationBy Peter SayerDec 5, 20253 minsCloud SecurityNetwork SecuritySecurity BrandPostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 20255 minsCloud SecurityCyberattacksCybercrime NewsMicrosoft Teams’ guest chat feature exposes cross-tenant blind spotBy Shweta Sharma Nov 27, 20254 minsCloud SecuritySecurityVulnerabilities NewsFluent Bit vulnerabilities could enable full cloud takeoverBy Shweta Sharma Nov 25, 20254 minsCloud SecuritySecurityVulnerabilities FeatureThe security leaders who turned their frustrations into companiesBy Jaikumar Vijayan Nov 12, 202515 minsCloud SecurityNetwork SecurityThreat and Vulnerability Management News AnalysisSalesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft DriftBy Maria Korolov Oct 22, 202510 minsAccess ControlAuthenticationData Breach OpinionIntroducing MAESTRO: A framework for securing generative and agentic AIBy Sina Manavi Oct 15, 202510 minsBankingCloud SecurityFinancial Services Industry ArticlesopinionDull but dangerous: A guide to 15 overlooked cybersecurity blind spotsIt’s not the fancy hacks that get you — it’s the boring stuff you forgot to patch. Here are 15 sneaky blind spots that could wreck your defenses.By Maman Ibrahim Oct 13, 2025 10 minsCloud SecurityNetwork SecurityVulnerabilitiesnewsFBI seizes BreachForums servers as threatened Salesforce data release deadline approachesDomain seized for a third time as police attempt to crack down on the group claiming major SaaS hack. By John E. Dunn Oct 10, 2025 5 minsCloud SecurityRansomwareSecuritynewsRed Hat OpenShift AI weakness allows full cluster compromise, warns advisoryThere’s no evidence of exploitation but sysadmins will want to check their environments.By John E. Dunn Oct 2, 2025 3 minsCloud SecurityVulnerabilitiesfeatureSpotlight report: Securing the cloudThis Special Report explores cloud security’s unique challenges, the extent of the threats facing organizations today, and how the rapid adoption of AI is amplifying the problem. You’ll learn where to look for hidden risks and essential strategies and best practices for securing your cloud environment. By CSO Staff Oct 1, 2025 1 minCloud SecurityEnterprise Buyer’s GuidesSecuritybrandpostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 2025 5 minsCloud SecurityCyberattacksCybercrimenewsChaos-Mesh flaws put Kubernetes clusters at risk of full takeoverFour newly discovered vulnerabilities in the fault simulation platform can lead to OS command injection and cluster takeover, even from unprivileged pods.By Lucian Constantin Sep 16, 2025 3 minsApplication SecurityCloud SecurityVulnerabilitiesopinionHow AI-powered ZTNA will protect the hybrid futureAI-driven ZTNA could finally free teams from endless security firefighting — if companies can break through the complexity holding them back.By Raghav Potluri Sep 16, 2025 7 minsArtificial IntelligenceCloud SecurityZero TrustnewsVMScape Spectre BTI attack breaks VM isolation on AMD and Intel CPUsThe Spectre-like CPU branch target injection (BTI) breaks the guest-host layer in virtualized environments, introducing a new threat to data centers and the cloud.By Lucian Constantin Sep 12, 2025 4 minsCloud SecurityVulnerabilitiesfeature6 hot cybersecurity trendsGenerative AI enthusiasm may be cooling, but agentic AI in the SOC — and the need to defend AI infrastructure — are increasingly top of mind for security leaders today.By Neal Weinberg Sep 10, 2025 11 minsAuthenticationPhishingRansomwarefeatureCCSP certification: Exam, cost, requirements, training, salaryThe Certified Cloud Security Professional (CCSP) is a cloud-focused security credential that can advance your career as a cybersecurity pro. Here are the details you need to know.By Josh Fruhlinger Sep 4, 2025 9 minsCertificationsCloud SecurityIT Skills and TrainingnewsStorm-0501 debuts a brutal hybrid ransomware attack chainStorm-0501 is hijacking privileged accounts, deleting backups, and encrypting cloud data in a new hybrid ransomware campaign. Microsoft urges CISOs to enforce least privilege, drill ransomware playbooks, and reassess the risks of keeping legacy on-prem assets.By Cynthia Brumfield Aug 27, 2025 5 minsCloud SecurityRansomwarefeatureASPM buyer’s guide: 7 products to help secure your applicationsSelecting the right application security posture management (ASPM) platform requires a deep understanding of your organization’s application estate and issues, as well as the widely ranging capabilities each ASPM solution offers.By David Strom Aug 20, 2025 11 minsApplication SecurityCloud SecurityEnterprise Buyer’s GuidesnewsNew security features beef up Google Cloud PlatformAdded capabilities include automated discovery of AI agents and Model Context Protocol (MCP) servers.By Howard Solomon Aug 19, 2025 7 minsArtificial IntelligenceCloud SecuritySecurity Show more Show less View all Resources whitepaper Zscaler ThreatLabz 2025 Ransomware Report Weaponized GenAI, faster execution, and extortion-first strategies are fueling a new age of ransomware. Explore the latest trends and insights. The post Zscaler ThreatLabz 2025 Ransomware Report appeared first on Whitepaper Repository –. By Zscaler 24 Nov 2025Business OperationsCloud SecuritySecurity whitepaper Zscaler ThreatLabz 2025 VPN Risk Report with Cybersecurity Insiders By Zscaler 24 Nov 2025Cloud SecurityNetwork SecuritySecurity whitepaper Analyst Report: The State of Cybersecurity and AI in Healthcare and Life Sciences By Thales 21 Nov 2025Business OperationsCloud SecurityData and Information Security View all Video on demand video Honeypots and the evolution of botnets | Salted Hash Ep 23 Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsApplication SecurityFirewalls DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 8, 2018 21 mins Application SecurityData BreachHacking Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 mins Cloud ComputingCloud SecuritySecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards Jul 20, 2017 41 mins AppleCloud SecuritySmartphones See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos how-to How to justify your security investments By Chritstoph SchuhwerkDec 11, 20256 mins C-SuiteCSO and CISOIT Leadership news Fortinet admins urged to update software to close FortiCloud SSO holes By Howard SolomonDec 10, 20254 mins Access ControlIdentity and Access ManagementSingle Sign-on news Making cybercrime illegal won't stop it; making cybersec research legal may By Maxwell CooterDec 10, 20255 mins CybercrimeGovernmentIndustry podcast CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure podcast Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing podcast The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management video CISO Reality: Record Pay, Rising Pressure, and Retention Risk By Joan GoodchildDec 10, 202527 mins CSO and CISOSecurity Infrastructure video Inside Visa’s Cyber Defense: CISO Subra Kumaraswamy on blending AI and Human Defense By Joan GoodchildDec 3, 202527 mins Artificial IntelligenceCSO and CISOPhishing video The Future of Cybersecurity Leadership: AI, Governance & Education | Kevin Powers, Boston College Nov 19, 202523 mins CyberattacksCybercrimeRisk Management