What your CEO needs to know about securing the Internet of Things

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 05, 2016
Featured Image

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that captured its own share of national headlines. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What your CEO needs to know about securing the Internet of Things
Major cybercrime network Avalanche dismantled in global takedown
Android malware steals access to more than 1 million Google accounts
IBM warns of rising VoIP cyberattacks
5 ways data classification can prevent an education data breach
Who's responsible for data compliance? 25% of executives don't know
AWS tries to protect its customers from DDoS attacks with new service
How Windows 10 data collection trades privacy for security

eGuide: Citrix Systems

eGuide: 2017 Security Best Practice Tips

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

Thumbnail Image

What your CEO needs to know about securing the Internet of Things

The recent Internet of Things-based DDoS attack on Dyn heralded the beginning of a new era for businesses. For better or for worse, industry experts’ warnings about the need to consider all “endpoints” rather than limiting security efforts to workstations and servers were vindicated. Read More

Thumbnail Image

Major cybercrime network Avalanche dismantled in global takedown

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years. Read More

Thumbnail Image

Android malware steals access to more than 1 million Google accounts

A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint. Read More

Thumbnail Image

IBM warns of rising VoIP cyberattacks

IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets. Read More

Thumbnail Image

5 ways data classification can prevent an education data breach

Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations. Read More

Thumbnail Image
INSIDER

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations. Read More

Thumbnail Image

AWS tries to protect its customers from DDoS attacks with new service

Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It’s called Shield, and the entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday. Read More

Thumbnail Image

How Windows 10 data collection trades privacy for security

Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft Read More

eBook: Citrix Systems

A Buying Guide for Next-Gen Remote Access

In order to give employees the work-fromanywhere-using-any-device flexibility they've come to expect, enterprise IT has been left with no alternative but to purchase point products for each of the applications and/or device profiles resulting in complexity in the datacenter. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.