Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Jan 30, 2017
Featured Image

How San Diego’s CISO battles cyberthreats

An overwhelming amount of ransomware and phishing attacks plague private and public companies. Columnist Rob Enderle writes how one CISO is successfully defending against the current threat landscape. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
How to protect your online privacy in the Trump era
Password-free security uses voice, user behavior to verify identity
Machine behaviors that threaten enterprise security
Trump administration is giving us a good lesson on Twitter security
Report: Trump still uses his unsecured Android phone to tweet
Facebook taps into NFC in Android phones for strong account security
Connected cars are ripe for hacking
How to protect your data, your vehicles, and your people against automotive cyberthreats?

White Paper: Smarsh

Digital Record Management for Government

State, federal, and local government agencies need to keep important records (including digital communications) for a long time, to stay in compliance with public records laws, open meeting, Freedom of Information Act (FOIA), and various state sunshine laws. If an agency has email, social media, web and other digital communications related to business activities, records must be available to anyone who asks for them. Read More

Thumbnail Image
INSIDER

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More

Thumbnail Image

How to protect your online privacy in the Trump era

You may not have anything to hide, but do you really want some government agency peeking into your private digital life? I didn't think so. Read More

Thumbnail Image

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More

Thumbnail Image

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in order to attack the perimeter. Read More

Thumbnail Image

Trump administration is giving us a good lesson on Twitter security

Several recent incidents involving U.S. President Donald Trump's administration can teach users something about IT security -- particularly about Twitter and what not to do with it. Read More

Thumbnail Image

Report: Trump still uses his unsecured Android phone to tweet

Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More

Thumbnail Image

Facebook taps into NFC in Android phones for strong account security

Facebook beefs up its two-factor authentication with support for security keys over NFC on Android phones. Read More

Thumbnail Image

Connected cars are ripe for hacking

Modern technology could make connected cars safer than ever for drivers, but security from potential hackers is imperative. Read More

Thumbnail Image
INSIDER

How to protect your data, your vehicles, and your people against automotive cyberthreats?

CSO explores the vulnerabilities and risks of automotive cyberattacks and methods for securing your data, human resources, and the connected vehicle environment. Read More

eGuide: Citrix Systems

eGuide: 2017 Security Best Practice Tips

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. The essential guide to anti-malware
3. How to wake the enterprise from IoT security nightmares
4. Free security tools to support cybersecurity efforts
5. Study: 62% of security pros don’t know where their sensitive data is

Editor's Picks

1. Why Google’s Sergey Brin changed his tune on AI
2. 5 tech jobs that will boom (and 2 that will bust) in 2017
3. Wine, women and data science
4. Your guide to top tech conferences
5. 6 new 2-in-1 devices to watch for in 2017
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.