Does privacy exist anymore? Just barely.

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Oct 28, 2016
Featured Image

How to approach keeping your IoT devices safe

With the recent take down of DYN and Brian Krebs’ web site, cybercriminals have found a way to use your own devices to bring the internet to its knees. Portnox’s CEO Ofer Amitai provides some ways to keep those devices safe from these attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Does privacy exist anymore? Just barely.
What awareness is supposed to be
Answers to ‘Is the internet broken?’ and other Dyn DDoS questions
Friday's IoT-based DDoS attack has security experts worried
Cybersecurity staffing issues may be putting you at risk
ARM builds up security in the tiniest IoT chips
Workstation software flaw exposes industrial control systems to hacking
DDoS attack shows dangers of IoT 'running rampant'
Dyn attack: U.S. Senator wants to know why IoT security is so anemic

White Paper: Verizon

Data Breach Digest

Learn from our data breach investigations. We investigate hundreds of data breaches every year. Take a look at our case files. Read More

Thumbnail Image

Does privacy exist anymore? Just barely.

The sphere of privacy continues to shrink. Read More

Thumbnail Image

What awareness is supposed to be

Recent W-2 and accounts payable thefts show governance should be the cornerstone of awareness. Read More

Thumbnail Image

Answers to ‘Is the internet broken?’ and other Dyn DDoS questions

A Q&A on what caused the Dyn DDoS attacks and what to do to protect yourself and your network. Read More

Thumbnail Image

Friday's IoT-based DDoS attack has security experts worried

The cybersecurity attack that relied on connected devices, or the Internet of Things, was serious, unusual and historic. Read More

Thumbnail Image

Cybersecurity staffing issues may be putting you at risk

Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs. Read More

Thumbnail Image

ARM builds up security in the tiniest IoT chips

On Tuesday, ARM will introduce processors that are just a fraction of a millimeter across and incorporate the company’s TrustZone technology. Read More

Thumbnail Image

Workstation software flaw exposes industrial control systems to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations. Read More

Thumbnail Image

DDoS attack shows dangers of IoT 'running rampant'

The DDoS attack launched Friday against Dyn should serve as a "wake-up call about security issues across IoT," said one cybersecurity expert. Read More

Thumbnail Image

Dyn attack: U.S. Senator wants to know why IoT security is so anemic

Sen. Mark Warner sent letters to FCC, FTC and DHS to find out what can be done to prevent attacks like the one that hit Dyn; how defend against botnet attacks like Mirai’s. Read More

White Paper: Lookout Mobile Security

Enterprise Mobile Threat Report

Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android. Read More

Take Computerworld's 2017 IT Salary Survey and you could win $500

Computerworld’s annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey.

How UPS delivers predictive analytics

The global shipping company’s BI and big data analytics platform offers increased visibility and control and the capability to identify patterns and movement across its transportation network. For customers this means foul weather won’t blow critical shipments off course.

Rebuilding your career after a layoff

There is life after the layoff. Take these 6 steps to engineer your own comeback.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.