A better security strategy than ‘know your enemy’: Know your co-workers

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 03, 2017
Featured Image

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A better security strategy than ‘know your enemy’: Know your co-workers
FCC puts the brakes on ISP privacy rules it just passed in October
Who should be on an insider risk team?
What should an insider risk policy cover?
Will a cyber crisis add to chaos of Trump’s first 100 days?
Trend Micro report: Ransomware booming
Global cybercrime prosecution a patchwork of alliances

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy. Read More

Thumbnail Image

FCC puts the brakes on ISP privacy rules it just passed in October

The new chairman of the U.S. Federal Communications Commission will seek a stay on privacy rules for broadband providers that the agency just passed in October. Read More

Thumbnail Image
INSIDER

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught. Read More

Thumbnail Image
INSIDER

What should an insider risk policy cover?

To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts. Read More

Thumbnail Image

Will a cyber crisis add to chaos of Trump’s first 100 days?

Forrester Research predicted last fall that the new president would confront a “cyber crisis” within the first 100 days. Experts say that’s an easy call – depending on how you define a crisis. Read More

Thumbnail Image

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers. Read More

Thumbnail Image

Global cybercrime prosecution a patchwork of alliances

Global efforts to combat cybercrime are built on a patchwork of alliances, taskforces and personal relationships. Read More

eBook: Turbonomic

Capacity Planning Fundamentals

As organizations scale, planning for greater application workload demand is critical. IT cannot afford to be seen as a bottleneck to successful business growth. Planning ahead is key, but as this ebook will discuss, equally important is the foundation you use to make projections. Read More

CIO Insider

1. Smackdown: Office 365 vs. G Suite productivity
2. State of the CIO 2017: More challenging, still complicated
3. 3 enterprise-strength file sync services to check out
4. Secrets of successful CISOs [Infographic]
5. How Google reinvented security and eliminated the need for firewalls

Editor's Picks

1. Verizon plans 5G trial service in 11 cities this year
2. How to develop an internet of things strategy
3. 7 project management tools any business can afford
4. New CIO appointments -- February 2017 edition
5. What is the point of learning C?
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.