A CMO's guide to staying secure on a business trip

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Apr 17, 2017
Featured Image

InfoSec pros feel less external pressure, take security more personally

Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a survey released this morning. But they are also putting more pressures on themselves. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A CMO's guide to staying secure on a business trip
How secure is your supply chain?
Privacy and the common man (or the FBI director)
What prevents breaches: process, technology or people? One answer is PC, and one is right.
Face-off: Cisco vs. Fortinet for enterprise firewalls
Improve your internet privacy, with or without help from the government
Microsoft Word exploit linked to cyberspying in Ukraine conflict
6 vulnerabilities to watch for on the factory floor
Microsoft kills off security bulletins after several stays
Travelers enlists Symantec to advise cyber insurance customers
Unpatched vulnerability exposes Magento online shops to hacking

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

A CMO's guide to staying secure on a business trip

Business leaders need to expand their knowledge, and this involves a lot of travel. How can you secure your intellectual properties while on the go? Read More

Thumbnail Image
INSIDER

How secure is your supply chain?

If you're like many organizations, your security focus is on protecting email, financial data and customer data. What if your greatest threats come from your vendors and supply chain? Read More

Thumbnail Image
Video

Privacy and the common man (or the FBI director)

CSO's Joan Goodchild and Steve Ragan discuss some of the latest security news, including how the FBI director inadvertently (or on purpose?) revealed his Twitter ID and what the new regulations regarding ISPs being able to sell your private data without your consent really entails. Watch Now

Thumbnail Image

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct. Read More

Thumbnail Image
INSIDER

Face-off: Cisco vs. Fortinet for enterprise firewalls

Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products. Read More

Thumbnail Image

Improve your internet privacy, with or without help from the government

President Trump, as part of his plan to roll back regulations put in place by President Obama, just signed legislation, passed by Congress, eliminating the prohibition against ISPs selling customer data without their written consent. This move has ignited a small firestorm of controversy. For businesses and enterprises however, this change is not as bad as it seems. Further, their privacy focus should be on search engines and social networks, which are much better at accumulating data. Read More

Thumbnail Image

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage. Read More

Thumbnail Image

6 vulnerabilities to watch for on the factory floor

Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected. Read More

Thumbnail Image

Microsoft kills off security bulletins after several stays

Microsoft this week retired the security bulletins that for decades have described each month's slate of vulnerabilities and patches for customers. Read More

Thumbnail Image

Travelers enlists Symantec to advise cyber insurance customers

The Travelers insurance company is offering free risk assessment advice from Symantec as a way to help lower their liability and get lower premiums. Read More

Thumbnail Image

Unpatched vulnerability exposes Magento online shops to hacking

An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops. Read More

White Paper: Level 3 Communications

Global Visibility Is The Difference

Today's cyber threats are increasing in volume, diversity and sophistication, rapidly outstripping the ability of point security solutions to safeguard critical data, applications and systems. Read More

Magazine

Download the CIO March/April digital issue

Learn how companies are leveraging AI and machine learning to bolster customer experience, improve security and optimize operations.

CIO Insider

1. How to prepare for a clean install of Windows 10 Creators Update
2. 5 reasons developers love containers
3. What it takes to become a data security strategist
4. Why smart enterprises are thinking AI
5. 21 hot programming trends—and 21 going cold

Editor's Picks

1. How design thinking drives Marriott's digital strategy
2. Microsoft vs. Apple: Strategies change but the battle continues
3. Why Facebook is giving Workplace away for free
4. How to build IT competencies for the AI era
5. 8 great small business productivity and collaboration apps
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.