Five things you need to know about ransomware

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 07, 2016
Featured Image

Hacking back will only get you in more trouble

Economic espionage is a serious problem with no demonstrably effective responses so far. But a panel of experts at the RSA conference agreed that hacking back is the worst of available options. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Five things you need to know about ransomware
Good security begins with the endpoint in mind
Relatives of victims, law enforcement groups support FBI in iPhone unlocking case
Is DevOps the Holy Grail for information security?
VMware CEO Gelsinger talks exec changes, Dell deal and his big security focus
AT&T, Verizon call for federal action on encryption policy
RSA: Verizon details data breaches from pirates to pwned water district
Amazon disabled encryption on its tablets and phones because nobody used it
San Bernardino prosecutor raises concerns about ‘cyber pathogen’ in terrorist's iPhone
Security spotlight: Kevin Walker, Juniper's Security CTO

White Paper: Tempered Networks

Helping Enterprises Become Secure by Default

The intensity of cyber attacks and proliferation of devices and non-traditional endpoints has radically changed the security environment from what it was just three years ago. Read More

Thumbnail Image

Five things you need to know about ransomware

Ransomware has become a real scourge for consumers, businesses and even government institutions. Unfortunately, there's no end in sight, so here's what you should know. Read More

Thumbnail Image

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement. Read More

Thumbnail Image

Relatives of victims, law enforcement groups support FBI in iPhone unlocking case

Several law enforcement groups and family members of victims of December's San Bernardino mass shooting have backed the FBI and opposed Apple in a court fight over an iPhone used by one of the shooters. Read More

Thumbnail Image

Is DevOps the Holy Grail for information security?

DevOps is the computing philosophy that, through unified agile software development and business operations, you can improve your products and time to market. But does it actually improve information security? Read More

Thumbnail Image

VMware CEO Gelsinger talks exec changes, Dell deal and his big security focus

At the RSA Conference, VMware demonstrates the security features of its NSX network virtualization product. Read More

Thumbnail Image

AT&T, Verizon call for federal action on encryption policy

The two carriers are directly affected by any outcome affecting encryption policy that could come from the nation's courts or Congress. Read More

Thumbnail Image

RSA: Verizon details data breaches from pirates to pwned water district

Verizon’s new Data Breach Digest tells stories about most common methods attackers used and how they were caught. Read More

Thumbnail Image

Amazon disabled encryption on its tablets and phones because nobody used it

Amazon caught flack on Wednesday for disabling the encryption capabilities of its Fire phones and tablets with a software update. The company says its reasoning was simple: people didn't use it. Read More

Thumbnail Image

San Bernardino prosecutor raises concerns about ‘cyber pathogen’ in terrorist's iPhone

The district attorney of San Bernardino County, Michael Ramos, has raised concerns about the possibility of a ‘dormant cyber pathogen’ in the iPhone 5c used by a terrorist in attacks in the county on Dec. 2. Read More

Thumbnail Image
Video

Security spotlight: Kevin Walker, Juniper's Security CTO

At the RSA Conference in San Francisco, Network World chats with Juniper Networks' new Security CTO about his role and how he will work with customers on securing their networks. Watch Now

Video/Webcast: Tempered Networks

Tempered Networks Breakthrough Cloaking Technology

See how a new technology for secure networking delivers a modern approach to safeguarding vulnerable endpoints and communications. Read More

Beyond jQuery: An expert guide to choosing the right JavaScript framework


resume makover
How to choose from 22 essential JavaScript frameworks for Web and mobile development.

Data lakes: A better way to analyze customer data


hot tech skills
Early adopters share their experiences.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.