Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Apr 14, 2017
Featured Image

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity
Top 10 ways to achieve agile security
Suspected CIA spying tools linked to hacks in 16 countries
Bank gets lesson in the security failings of third parties
Rollback of FCC privacy requirements could have broad repercussions
Why the board needs security leaders to fuel disciplined growth
Why you should study security in college
Dridex gang uses unpatched Microsoft Word exploit to target millions
DNS record will help prevent unauthorized SSL certificates

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday. Read More

Thumbnail Image

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted Read More

Thumbnail Image

Suspected CIA spying tools linked to hacks in 16 countries

The suspected CIA spying tools that WikiLeaks has dumped have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec. Read More

Thumbnail Image

Bank gets lesson in the security failings of third parties

Brazilian bank was an easy target after its DNS provider was compromised. Read More

Thumbnail Image

Rollback of FCC privacy requirements could have broad repercussions

Last week's roll-back of FCC privacy regulations was good news for ISPs and marketers and bad news for privacy advocates. But the decision could also have an impact on enterprise cybersecurity, experts say Read More

Why the board needs security leaders to fuel disciplined growth

Peter Cohan shares insights from his career and latest book to explain the importance of security in the boardroom and what boards and security leaders need to advance their relationship Read More

Thumbnail Image

Why you should study security in college

An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college. Read More

Thumbnail Image

Dridex gang uses unpatched Microsoft Word exploit to target millions

The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit used in attacks for months and used it to target millions of users. Read More

Thumbnail Image

DNS record will help prevent unauthorized SSL certificates

Starting in September, publicly trusted certificate authorities will have to honor a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains. Read More

White Paper: BlueLock LLC

A Two-Pronged Approach to Locking Down IT Security

A single security breach can cause permanent damage to a company's reputation - and relationship with consumers. Proactive measures, such as identity and access management controls, can minimize the impact of a breach. But what happens in the aftermath of an attack? Read on to discover how the right disaster recovery strategy can get your systems up and running in no time. Read More

Magazine

Download the CIO March/April digital issue

Learn how companies are leveraging AI and machine learning to bolster customer experience, improve security and optimize operations.

CIO Insider

1. How HPE plans to spin out its software assets
2. 6 terrible tech managers—and how to succeed despite them
3. 2 big mistakes CIOs make with digital strategy
4. What are containers and why do you need them?
5. IT Resume Makeover: Transitioning from IT pro to IT leader

Editor's Picks

1. How to prepare for a clean install of Windows 10 Creators Update
2. IT leaders share how they quell cybersecurity attacks
3. Why enterprises are upgrading to Windows 10 faster than expected
4. How a CEO can kill a company in 5 easy steps
5. 7 agile certifications to take your career to the next level
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.