Breaking down New York’s new cyber regulations

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Nov 18, 2016
Featured Image

Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Breaking down New York’s new cyber regulations
6 ways to add cybersecurity protections to outsourcing deals
12 steps to lower your espionage risk
How voice recognition will affect privacy in the Internet of Things
DoS technique lets a single laptop take down an enterprise firewall
This malware attack starts with a fake customer-service call
Is critical infrastructure the next DDoS target?
How automated investigation can accelerate threat detection
US lawmakers balk at call for IoT security regulations

White Paper: Veracode

Gartner Magic Quadrant for Application Security Testing

Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Read More

Thumbnail Image

Breaking down New York’s new cyber regulations

Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity requirements. Read More

Thumbnail Image

6 ways to add cybersecurity protections to outsourcing deals

There is growing concern about how third-party IT services providers are protecting corporate data. Here are six ways IT leaders can better negotiate cybersecurity and data privacy issues. Read More

Thumbnail Image
INSIDER

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back. Read More

Thumbnail Image

How voice recognition will affect privacy in the Internet of Things

An Internet of Things (IoT) device using voice recognition requires the collection and interpretation of sounds. These sounds may extend far beyond the voice commands being given and cannot avoid being captured. How sound is captured and processed may lead users to believe an organization is either respectful or a voyeur. Read More

Thumbnail Image

DoS technique lets a single laptop take down an enterprise firewall

Researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls. Read More

Thumbnail Image

This malware attack starts with a fake customer-service call

Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. Read More

Thumbnail Image

Is critical infrastructure the next DDoS target?

DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical infrastructure. Read More

Thumbnail Image

How automated investigation can accelerate threat detection

Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment. Read More

Thumbnail Image

US lawmakers balk at call for IoT security regulations

The U.S. government needs to pass regulations mandating internet of things security measures before device vulnerabilities start killing people, one security expert told lawmakers. Read More

Video/Webcast: Veracode

The Cyber Security at Your Company is at Risk

We've seen a dramatic rise in attacks on the application layer. Often left unguarded, this layer has become a prime gateway for attacks. Avoid the brand and financial damage these attacks cause. Protect your company's brand - watch this video highlighting why application security matters! Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.