A vigilante hacker may have built a computer worm to protect the IoT

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Apr 24, 2017
Featured Image

Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A vigilante hacker may have built a computer worm to protect the IoT
10 ways Trusted Identities are used
Are we ready to bid the SIEM farewell?
Most employees willing to share sensitive information, survey says
Hackers use old Stuxnet-related bug to carry out attacks
Cybersecurity industry braces for tighter visa rules
What's in the fine print of your disaster recovery vendor agreement?
How CIOs can fight the rise in shadow email

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. Read More

Thumbnail Image

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used. Read More

Thumbnail Image

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks. Read More

Thumbnail Image

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher -- 81 percent said they should share sensitive, confidential or regulated information. Read More

Thumbnail Image

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks. Read More

Thumbnail Image

Cybersecurity industry braces for tighter visa rules

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity -- but there is also a chance that it will inspire more Americans to enter the profession. Read More

Thumbnail Image

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises will be reimbursable if not met. Bluelock's Brandon Jeffress reviews what is essential to be in an ironclad SLA. Read More

Thumbnail Image

How CIOs can fight the rise in shadow email

One feature of today’s cloud-centric landscape is just how many different services may be sending email on your company’s behalf. We call this “shadow email,” and like shadow IT, it lurks in the dark corners of your domain, making CIOs vulnerable to liability, compliance and security issues. But there is a way through this thicket of confusion. Read More

Research/Infographic: Citrix Systems

Manage Risk by Protecting the Apps and Data that Drive Business Productivity

View this infographic to discover the security strategies needed to overcome the challenges of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. Read More

CIO Insider

1. How HPE plans to spin out its software assets
2. 2 big mistakes CIOs make with digital strategy
3. IT Resume Makeover: Transitioning from IT pro to IT leader
4. 6 terrible tech managers — and how to succeed despite them
5. IT service providers get low marks on innovation

Editor's Picks

1. What’s behind VMware’s Wavefront acquisition?
2. Three simple ways to stop the Windows Creators Update from ruining your day
3. 8 great small business productivity and collaboration apps
4. Why AI will both increase efficiency and create jobs
5. 12 digital marketing and customer experience tips for success
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.