Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

Email not displaying correctly? View it in your browser.

CIO

CIO Daily

Jan 30, 2017
Featured Image

11 ways company politics can thwart your projects

Politics is an unfortunate reality in many workplaces, but there are steps you can take to reduce the pervasiveness and impact to projects. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
33% off Raspberry Pi 3 Model B Motherboard - Deal Alert
Why car companies need to become tech companies
Trump’s trade TPP move a setback for cloud computing
LinkedIn ranks the 10 most promising jobs of 2017
Why Google still isn't giving up on Google+
Top 26 entrepreneur podcasts to listen to in 2017
A new service for the less techie criminals

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image
INSIDER

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More

Thumbnail Image
DealPost

33% off Raspberry Pi 3 Model B Motherboard - Deal Alert

The Raspberry Pi 3 Model B Board features a quad-core 64-bit ARM Cortex A53 clocked at 1.2 GHz. The Pi 3 features on-board 802.11N WiFi and Bluetooth 4.0. Read More

Thumbnail Image

Why car companies need to become tech companies

The biggest risk any industry faces is its inability to change. In the automobile industry, if things don’t change, columnist Rob Enderele writes, there are likely to be fewer car companies left, especially U.S. car companies. Read More

Thumbnail Image

Trump’s trade TPP move a setback for cloud computing

With President Trump's move to walk away from the Trans-Pacific Partnership, administration is 'starting from zero' on digital trade policy. Read More

Thumbnail Image

LinkedIn ranks the 10 most promising jobs of 2017

These jobs offer the highest median salaries, the most openings and the biggest growth potential. Read More

Thumbnail Image

Why Google still isn't giving up on Google+

Google+ may be on the decline, but Google isn’t ready to call it quits on the social network just yet. Read More

Thumbnail Image

Top 26 entrepreneur podcasts to listen to in 2017

CIO magazine's Jordan French assembles the top 26 podcasts to listen to in 2017 after a year of research, vetting, and, well--listening. Read More

Thumbnail Image

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. The essential guide to anti-malware
3. How to wake the enterprise from IoT security nightmares
4. Free security tools to support cybersecurity efforts
5. Study: 62% of security pros don’t know where their sensitive data is

Editor's Picks

1. Why Google’s Sergey Brin changed his tune on AI
2. 5 tech jobs that will boom (and 2 that will bust) in 2017
3. Wine, women and data science
4. Your guide to top tech conferences
5. 6 new 2-in-1 devices to watch for in 2017
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.