Corporate boards aren't prepared for cyberattacks

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 30, 2016
Featured Image

CIOs eye automation, platform strategies, cybersecurity for 2017

Five CIOs discuss with CIO.com their big plans for the New Year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Corporate boards aren't prepared for cyberattacks
What fake news means for IT—and how IT security can help fight it
Using big data for security only provides insight, not protection
Ransomworm: the next level of cybersecurity nastiness
9 gifts IT needed but didn't get in 2016

White Paper: Fortinet, Inc.

Advanced Threats, Advanced Solutions: Integrating a Sandbox Into Your Infrastructure

The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More

Thumbnail Image

Corporate boards aren't prepared for cyberattacks

CEOs, board members need to bone up on cybersecurity and not leave those matters to CIOs, analyst says Read More

Thumbnail Image

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about. Read More

Using big data for security only provides insight, not protection

Machine learning provides the protection big data analytics lack. Instead of figuring out why a breach happened after the fact, machine learning can identify a data breach as it’s happening Read More

Thumbnail Image

Ransomworm: the next level of cybersecurity nastiness

As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse. Read More

Thumbnail Image

9 gifts IT needed but didn't get in 2016

In 2016 IT departments received technology that disappointed, didn’t deliver, took the wrong direction or didn’t arrive at all. Here’s what your IT team is still waiting for as we head into 2017. Read More

White Paper: Fortinet, Inc.

Best Practices in Network Segmentation for Security

With the rise of BYOD, cloud-based services, and IoT, network boundaries are expanding and becoming increasingly difficult to secure. The enterprise perimeter is often penetrated and once inside, malware can move through the network, launching a devastating attack. In this research note by Gartner, learn how to implement better network segmentation to reduce or eliminate threats from spreading throughout your network. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.