What security practitioners can learn from the United’s failures

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Apr 21, 2017
Featured Image

5 ways to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What security practitioners can learn from the United’s failures
Trump's cybersecurity mystery: 90 days in, where's the plan?
How to prevent your mobile app from getting hacked
How one personal cyber insurance policy stacks up
At $175, this ransomware service is a boon to cybercriminals
The 20 highest-paying markets for cybersecurity engineers
Cybersecurity companies to watch
Privacy for everybody means privacy for pedophiles
Report: Cybercriminals prefer Skype, Jabber, and ICQ

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

What security practitioners can learn from the United’s failures

The United airlines debacle was a complete failure of process, and many security programs suffer the same fate. Read More

Thumbnail Image

Trump's cybersecurity mystery: 90 days in, where's the plan?

On Jan. 6, Donald Trump said his administration would produce a report on cybersecurity within 90 days after his inaguration. On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one is on the way. Read More

Thumbnail Image

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use Read More

Thumbnail Image

How one personal cyber insurance policy stacks up

As policies designed for consumers emerge, the example from AIG is surprisingly comprehensive. Read More

Thumbnail Image

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175. Read More

Thumbnail Image

The 20 highest-paying markets for cybersecurity engineers

IT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top pay check. Randstat recently released its annual IT salary study, which looked at the top 45 highest paying markets in 27 states. Following are the top 20 markets for cyber security engineers, based on the medium salary reported. Read More

Thumbnail Image
INSIDER

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity.  Read More

Thumbnail Image

Privacy for everybody means privacy for pedophiles

The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure. Read More

Thumbnail Image

Report: Cybercriminals prefer Skype, Jabber, and ICQ

The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning. Meanwhile, consumer-grade platforms like AOL Instant Messenger and Yahoo IM have fallen out of favor, while newer, more secure consumer oriented platforms like Telegram and WhatsApp are also gaining popularity. Read More

Research/Infographic: Citrix Systems

Manage Risk by Protecting the Apps and Data that Drive Business Productivity

View this infographic to discover the security strategies needed to overcome the challenges of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. Read More

Magazine

Download the CIO March/April digital issue

Learn how companies are leveraging AI and machine learning to bolster customer experience, improve security and optimize operations.

CIO Insider

1. How to prepare for a clean install of Windows 10 Creators Update
2. 5 reasons developers love containers
3. What it takes to become a data security strategist
4. Why smart enterprises are thinking AI
5. 21 hot programming trends—and 21 going cold

Editor's Picks

1. How design thinking drives Marriott's digital strategy
2. Microsoft vs. Apple: Strategies change but the battle continues
3. Why Facebook is giving Workplace away for free
4. How to build IT competencies for the AI era
5. 8 great small business productivity and collaboration apps
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.