These 10 people may be your greatest inside security risks

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 24, 2017
Featured Image

It's time to face the ugly reality of face recognition

Most forms of biometric data are hard to get, and you usually need someone's permission to capture fingerprint or iris scans. But anyone can take a picture of your face. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

These 10 people may be your greatest inside security risks
Some HTTPS inspection tools might weaken security
FBI investigating possible Trump-Russia collusion, dismisses wiretap allegations
Russia will strike US elections again, FBI warns
BlackBerry readies a more secure version of the Samsung Galaxy S7
Cebit showcases security after Snowden
What it takes to become an IT security engineer
Critical infrastructure: Off the web, out of danger?

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access. Read More

Thumbnail Image

Some HTTPS inspection tools might weaken security

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns. Read More

Thumbnail Image

FBI investigating possible Trump-Russia collusion, dismisses wiretap allegations

Amid widespread hacking purportedly sanctioned by the Russian government, FBI Director Comey confirms active investigation into potential coordination between Trump campaign and foreign operatives, while shooting down allegations that Obama had Trump Tower wiretapped. Read More

Thumbnail Image

Russia will strike US elections again, FBI warns

Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday. Read More

Thumbnail Image

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. Read More

Thumbnail Image

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany. Read More

Thumbnail Image
INSIDER

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More

Thumbnail Image

Critical infrastructure: Off the web, out of danger?

For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the internet. But other experts say the level of risk, while low, is still unacceptable. Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

CIO Insider

1. How to get started as an IT consultant
2. New report: State of the CIO 2017
3. Ultimate guide to strategic tech partners
4. What are containers and why do you need them?
5. How to pick a project management methodology

Editor's Picks

1. Why Apple dropped iPad’s price to lowest yet
2. Why your cloud strategy should include multiple vendors
3. How to use data analytics to improve project outcomes
4. Your guide to top tech conferences 2017
5. Why great chief data officers are hard to find
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.