4 historic security events of 2016 and what they teach us [Infographic]

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 19, 2016
Featured Image

Be on high alert for this holiday spam

Scam artists don't care if this is the time for giving. They see the holidays as an opportunity to find a poor soul to fool. Here are some examples found thus far. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

4 historic security events of 2016 and what they teach us [Infographic]
Non-malware attacks are on the rise
Hacker allegedly stole logins from a US election agency
Dyn attack highlights 2016 security woes
Privacy protections for wearable devices are weak, study says
5 things you should do following the Yahoo breach
Hackers get around AI with flooding, poisoning and social engineering
HTTP/2 promises better performance -- but with security caveats

White Paper: Kaspersky

Could Your Business Survive A Cryptor?

When a business is hit by cryptomalware, data is encrypted into an unreadable form until a ransom is paid to cybercriminals. No wonder 42% of SMBs consider this to be one of their most security threats. Download this whitepaper to learn how you can protect your business from this dangerous scenario. Read More

Thumbnail Image
INSIDER

4 historic security events of 2016 and what they teach us [Infographic]

>From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed. Read More

Thumbnail Image

Non-malware attacks are on the rise

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Read More

Thumbnail Image

Hacker allegedly stole logins from a US election agency

A Russian-speaking hacker has been found selling stolen login credentials for a U.S. agency that tests and certifies voting equipment, according to a security firm. Read More

Thumbnail Image

Dyn attack highlights 2016 security woes

This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to impact the market for years to come. Read More

Thumbnail Image

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, with some device makers collecting massive amounts of personal data and sharing it with other companies, according to a new study. Read More

Thumbnail Image

5 things you should do following the Yahoo breach

Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features. Read More

Thumbnail Image

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them Read More

Thumbnail Image

HTTP/2 promises better performance -- but with security caveats

The new internet communication protocol, HTTP/2, is now being used by 11 percent of websites -- up from just 2.3 percent a year ago. And while there have been no security problems found in the HTTP/2 protocol itself, there are vulnerabilities in some implementations and the possibility of lower visibility into internet traffic, so it's worth waiting for everything to shake out. Read More

Video/Webcast: Dyn Inc

How Multi-Vendor DNS Can Protect Your Internet Presence

Watch this On-Demand webinar as it discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.