Protection is dead. Long live detection.

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Oct 31, 2016

Lessons learned from the DYN attack

The large scale DDoS attack on DYN last week interrupted access to many major web sites, and while the specifics of the attack have been widely analyzed, here are the important lessons learned Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Protection is dead. Long live detection.
Why IoT devices are the 'unusual suspects' in DDOS attacks
CIO security lessons: Dark thinking on IoT & exploding enterprise networks
The limits of encryption
Startup Nubeva pitches Security-as-a-Service in the cloud
Malware from Friday's DDoS attack continues to harass in short bursts
Pennsylvania man sentenced to 18 months for celeb hacking
Personal data of 550,000 Red Cross blood donors was breached
Why studying security in college is a waste of time

White Paper: Verizon

Data Breach Digest

Learn from our data breach investigations. We investigate hundreds of data breaches every year. Take a look at our case files. Read More

Thumbnail Image

Protection is dead. Long live detection.

As critical as it is, protection will fail. You need robust detection as well. Read More

Thumbnail Image

Why IoT devices are the 'unusual suspects' in DDOS attacks

While CIOs have shored up PCs and software systems for years, they should start to look at video conferencing systems, webcams and other inconspicuous network devices, which can be exploited to trigger devastating DDOS attacks. Read More

Thumbnail Image

CIO security lessons: Dark thinking on IoT & exploding enterprise networks

On the heels of massive IoT-enabled DDoS attack, security experts make their pitches to SIMposium 2016 attendees Read More

Thumbnail Image

The limits of encryption

The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted. Read More

Thumbnail Image

Startup Nubeva pitches Security-as-a-Service in the cloud

A team made up of executives from Aruba Networks and Panzura are out with a new self-funded startup this week that aims to deploy security tools that enterprises use in their campus and extend it to the cloud. Read More

Thumbnail Image

Malware from Friday's DDoS attack continues to harass in short bursts

It's still unclear who pulled off Friday's massive internet disruption, but the malware largely responsible for the cyber attack has since been found assaulting new targets -- possibly video gamers. Read More

Thumbnail Image

Pennsylvania man sentenced to 18 months for celeb hacking

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people. Read More

Thumbnail Image

Personal data of 550,000 Red Cross blood donors was breached

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor. Read More

Thumbnail Image
INSIDER

Why studying security in college is a waste of time

To gain the security skills most needed at many companies, students and graduates will have to take a counterintuitive approach to their education and career. Whether just entering college or recently graduated, Shawn Burke, Global CSO, Sungard AS, details how to get started. Read More

White Paper: Lookout Mobile Security

Enterprise Mobile Threat Report

Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android. Read More

5 strategies to reboot your IT career

Whether you cut your teeth on Unix and AIX or you tire of doing the necessary but thankless tasks that come with keeping the lights on and the datacenter humming, there's still time to reinvent yourself. Here's how.

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

Got 15 minutes? Take the 2017 Salary Survey and enter to win $500

Computerworld's annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.