Is your car secure? Maybe not, but enterprise users can still learn something

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Jul 08, 2016
Featured Image

Rio Olympics pose security risks to travelers

Physical safety isn't the only thing that travelers need to worry about at the Rio Olympics -- security experts warn that travelers need to be extremely careful when they access computer networks, as well. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Is your car secure? Maybe not, but enterprise users can still learn something
Big Brother is listening as well as watching
Top 10 advanced endpoint protection tools
Examining man-in-the-middle attacks
8 ingredients of an effective disaster recovery plan
Court decision raises issues about sharing passwords
Study reveals security gap in big data projects

White Paper: Thycotic Software

2016 State of Privileged Account Management Report

Co-sponsored by Thycotic and Cybersecurity Ventures, the 2016 State of PAM Report presents the results & findings of a survey of over 550 organizations. Read More

Thumbnail Image

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better. Read More

Thumbnail Image

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and ‘unreasonable’ searches. Read More

Thumbnail Image

Top 10 advanced endpoint protection tools

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule reviews of 10 advanced endpoint protection products: Read More

Thumbnail Image

Examining man-in-the-middle attacks

David Richardson, director of product at Lookout, walks us through this all-too-common attack.   Read More

Thumbnail Image

8 ingredients of an effective disaster recovery plan

IT executives and disaster recovery experts share their advice on how businesses can create an effective DR plan. Read More

Thumbnail Image

Court decision raises issues about sharing passwords

An appeals court has ruled that a former employee of a company, whose computer access credentials were revoked, had acted “without authorization” in violation of the Computer Fraud and Abuse Act, when he and other former employees used the login credentials of a current employee to gain access to data on the employer’s computers. Read More

Thumbnail Image
INSIDER

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report. Read More

eBook: Palerra

AWS Cautionary Tales and How Your Organization Can Avoid Becoming One

Cloud security is a shared responsibility between the organization and the provider. Organizations face a number of challenges in securing their AWS instance, including detection of anomalous activity, monitoring security configurations, and incident remediation. Unfortunately, many organizations lack sufficient cloud security measures to adequately address their end of the Shared Responsibility Model. Read More

How (and why) to customize the Windows 10 Start menu

The Windows 10 Start menu is a blend of navigation from Windows Phone and Windows 7, and it's highly customizable. We’ll walk you through it.

8 project management skills in high demand

By 2020, reports estimate that there will 700,000 new project management jobs in the United States. Do you have what employers will be looking for?

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.