Security execs voice concern over Trump travel ban

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Feb 03, 2017
Featured Image
INSIDER

Cybersecurity's million dollar jobs

Jeremy King says there's some cybersecurity leadership roles at large U.S. corporations offering $1 million compensation packages. The recipients of these big pay packages include military cyber experts making a switch to the commercial sector. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security execs voice concern over Trump travel ban
CSOs set to make the big bucks in 2017
Obama’s cybersecurity legacy: Good intentions, good efforts, limited results
Trump to sign cybersecurity order calling for government-wide review
What IT security pros are earning in 2017
Report: Passwords not going away any time soon
Cisco: Spam is making a big-time comeback
Trump stresses cybersecurity but postpones executive order
Are Apple-specific threats on the rise?
Sniff out and kick out Windows malware for free
How Facebook and Google are battling internet terrorism

White Paper: Hyland Software

ECM in the Cloud: Content Made Easier

A new survey from IDG finds growing confidence in the security of cloud-based enterprise content management solutions. The survey found that the number of organizations using ECM solutions deployed in the public cloud will expand over the next 12 months. Read More

Thumbnail Image

Security execs voice concern over Trump travel ban

Senior security industry professionals were dismayed about the travel ban imposed this weekend by President Trump, and worried that the repercussions could go far beyond the handful of countries singled out so far. Read More

Thumbnail Image
INSIDER

CSOs set to make the big bucks in 2017

Last year was a record one for cyberattacks, and that is keeping the demand for IT security pros at an all-time high. So what should these in-demand pros be earning? Four recent salary studies offer insights on what you can expect to earn in 2017. Read More

Thumbnail Image

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security. Read More

Thumbnail Image

Trump to sign cybersecurity order calling for government-wide review

President Donald Trump is due to sign an executive order Tuesday that gives each cabinet official more responsibility for the safety of data within their agency. Read More

Thumbnail Image
INSIDER

What IT security pros are earning in 2017

Last year was a record one for cyberattacks, and that is keeping the demand for IT security pros at an all-time high. So what should these in-demand pros be earning? Four recent salary studies offer insights on what you can expect to earn in 2017. Read More

Thumbnail Image

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures. Read More

Thumbnail Image

Cisco: Spam is making a big-time comeback

Spam is making a surprising resurgence as a threat to corporate security and becoming a more significant carrier of attacks as varied as spear phishing, ransomware and bots, according to Cisco’s 2017 Annual Cybersecurity Report. Read More

Thumbnail Image

Trump stresses cybersecurity but postpones executive order

U.S. President Donald Trump called on government agencies to better protect their networks, but he delayed signing an executive order to kick-start a government-wide review of cybersecurity policy. Read More

Thumbnail Image

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike. Read More

Thumbnail Image

Sniff out and kick out Windows malware for free

Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system Read More

Thumbnail Image

How Facebook and Google are battling internet terrorism

Leading platform providers are exploring new ways to actively engage in counter-messaging, building on robust systems to flag and remove extremist content. Read More

White Paper: Rapid7

Integrating Logentries with .NET- The How & Why

Explore how application logging provides valuable insight, affording visibility into end user interactions, overall health and performance of your network application stack. This whitepaper discusses the how to install, configure, and use the most common .NET logging frameworks with Logentries. Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. The essential guide to anti-malware
3. How to wake the enterprise from IoT security nightmares
4. Free security tools to support cybersecurity efforts
5. Study: 62% of security pros don’t know where their sensitive data is

Editor's Picks

1. Why Google’s Sergey Brin changed his tune on AI
2. 5 tech jobs that will boom (and 2 that will bust) in 2017
3. Wine, women and data science
4. Your guide to top tech conferences
5. 6 new 2-in-1 devices to watch for in 2017
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.