Cunning hack attacks built-in Windows anti-malware software

Email not displaying correctly? View it in your browser.

CIO

CIO Security

May 15, 2017
Featured Image

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cunning hack attacks built-in Windows anti-malware software
Cisco patches critical IOS security fault found after CIA WikiLeaks dump
How to counteract another ‘Dyn-like’ attack
Mixed reviews for Trump’s Executive Order on cybersecurity
Ad network takes steps to reduce fraud
Certain HP laptops are found recording users' keystrokes
Q&A Citrix CSO: How to deal with security across multiple generations of employees

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Cunning hack attacks built-in Windows anti-malware software

Quick action by Google and Microsoft appears to have put out the fire. But it’s another reminder that running old versions of Windows can be dangerous. Read More

Thumbnail Image

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year. Read More

Thumbnail Image

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from similar attacks. Read More

Thumbnail Image

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved. Read More

Thumbnail Image

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud. Read More

Thumbnail Image

Certain HP laptops are found recording users' keystrokes

Over two dozen HP laptop models may have secretly been recording users’ keystrokes by mistake, according to a Swiss security firm. Read More

Thumbnail Image

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation. Read More

Video/Webcast: Citrix

Improve User Productivity without Compromising Data Security and Compliance

Organizations are increasingly dealing with security issues on a day to day basis with data loss being a significant concern. Employees regularly share files with entities outside the organization, which has increased concern about losing sensitive corporate data. IT and Security teams are in a constant struggle to improve their security measures while not significantly impacting user productivity. However, keeping that balance is a challenge. Read More

CIO Insider

1. Robotic process automation market poised for explosive growth
2. 21 hot programming trends—and 21 going cold
3. Report: Top 25 IT security products
4. 6 strategies for becoming a digital business
5. How to do mobile dev right

Editor's Picks

1. CIO.com honors the 2017 CIO 100 winners and Hall of Fame inductees
2. Digital disruption is coming but most businesses don't have a plan
3. How to connect business strategy with project management
4. 9 essential tools for the security-conscious mobile worker
5. How Microsoft plans to reinvent business productivity
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.