Breaches, IT skills & innovation keeping CIOs up at night

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Oct 21, 2016
Featured Image

How to avoid being the next Yahoo

It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be able to do this effectively, you need be attuned with your network controls and architecture. VArmour CEO Tim Eades offers a few questions decision makers should be asking to ensure they keep their organizations from being the next Yahoo. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Breaches, IT skills & innovation keeping CIOs up at night
Younger consumers more likely to fall for tech support con jobs
How can good guys take advantage of DNS
Half of US adults are profiled in police facial recognition databases
Hackers hide stolen payment card data inside website product images
CIOs discuss whether Note7 recall hurts Samsung’s enterprise appeal
CISOs, it’s time to bury the hatchet with your CIO
CloudVelox eases migration of core business apps to the cloud
Researcher unveils second Samsung Pay vulnerability
How businesses address death, privacy and data quality
Ecuador says it cut WikiLeaks founder's internet access to prevent U.S. election interference

White Paper: Trend Micro Incorporated

Beyond Next-Gen: Defining Future-Ready Endpoint Security

The term "next-gen" is commonly cited by technology vendors to position a product as being innovative based on new and differentiated capabilities. Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology. Read More

Thumbnail Image

Breaches, IT skills & innovation keeping CIOs up at night

To say that CIOs have full plates – from guarding against breaches to cloud migration to embracing innovation – is an understatement. But given the growing recognition of IT’s importance to organizations of all kinds, it’s also a tremendous time to be a CIO despite the complications and demands of the job. Read More

Thumbnail Image

Younger consumers more likely to fall for tech support con jobs

Contrary to conventional wisdom, it's not older consumers who are most easily duped by tech support scams. Read More

Thumbnail Image

How can good guys take advantage of DNS

Here is a list of the various advantages of internal and external DNS to the enterprises that can proactively mitigate known and unknown threats. Read More

Thumbnail Image

Half of US adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study. Read More

Thumbnail Image

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection. Read More

Thumbnail Image

CIOs discuss whether Note7 recall hurts Samsung’s enterprise appeal

Samsung's brand took a beating over the past months as reports of exploding Galaxy Note7 smartphones made headlines and the company desperately did damage duty. In the enterprise, however, CIOs and IT leaders say Samsung has earned a second chance. Read More

Thumbnail Image

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together. Read More

Thumbnail Image
INSIDER

CloudVelox eases migration of core business apps to the cloud

CloudVelox CEO Raj Dhingra shares his thoughts on how you get core business applications running in your data center moved into the cloud. Read More

Thumbnail Image

Researcher unveils second Samsung Pay vulnerability

A security researcher has found a second vulnerability in Samsung Pay and plans to demonstrate it at a security conference next week in Argentina Read More

Thumbnail Image

How businesses address death, privacy and data quality

I recently received a reminder from a social network to reach out to a friend who died several years ago. The reminder got me to thinking about how we, as a business community, should consider treating personal information when we learn someone has passed on. Read More

Thumbnail Image

Ecuador says it cut WikiLeaks founder's internet access to prevent U.S. election interference

Ecuador's embassy in the U.K. says it alone was responsible for cutting WikiLeak's founder Julian Assange's internet connection, stating that the country doesn't want to interfere with the U.S. elections. Read More

White Paper: Trend Micro Incorporated

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands attack surfaces. How are organizations responding? Read More

State of the CIO 2017

What projects are CIOs prioritizing in the year ahead? Where are they spending those precious IT dollars? These are the questions that will be answered (with your help!) in our 16th annual State of the CIO survey. Make your voice heard!

Enter the brave new world of Windows 10 license activation

Historically, hardware upgrades on Windows PCs that involved major changes (new motherboard and/or CPU, for example) required a phone call to Microsoft to reactivate the Windows license. Microsoft has altered its licensing policy to cut down on calls. Here’s what happened when we tested this hypothesis.

ERP heads for the cloud

Cloud-based ERP will eventually rule, and on-premises software is destined for legacy status. How can IT ensure a smooth transition?

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.