IT leaders say it's hard to keep the cloud safe

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Feb 20, 2017
Featured Image
INSIDER

Secrets of successful CISOs [Infographic]

Who the CISO reports to matters more than you might think, but it isn’t the only secret to success. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IT leaders say it's hard to keep the cloud safe
Tech groups gear up for FISA surveillance fight
Doubts abound over US action on cybersecurity
Sophos CEO sounds the alarm on enterprise ransomware attacks
Russian cyberspies blamed for US election hacks are now targeting Macs
AI faces hype, skepticism at RSA cybersecurity show
What happens if your thermostat is hacked? Researchers name the top 7 security threats
Should security pros get special H-1B visa consideration?
7 ways MDM threatens employee privacy
Tips for negotiating with cyber extortionists
Microsoft's monthlong delay of patches may pose risks

White Paper: Intel Security

Bust the myth of the malware "silver bullet."

"Silver bullet" solutions might provide initial malware relief. But they'll never protect endpoints from emboldened cybercriminals like a coordinated security platform will. Only our endpoint defense combats emerging threats while simplifying your security operations. All, with traditional protection, advanced analytics, and containment throughout the threat lifecycle. Read the white paper. Read More

Thumbnail Image

IT leaders say it's hard to keep the cloud safe

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it, according to a report from Intel. Read More

Thumbnail Image

Tech groups gear up for FISA surveillance fight

A controversial provision in U.S. law that gives the National Security Agency broad authority to spy on people overseas expires at the end of the year, and six major tech trade groups are gearing up for a fight over an extension. Read More

Thumbnail Image

Doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election. Read More

Thumbnail Image

Sophos CEO sounds the alarm on enterprise ransomware attacks

Ransomware is increasingly becoming a problem for companies, and the CEO of a leading computer security company says he fears 2017 could see entire companies shut down until they pay up, or risk losing all their data. Read More

Thumbnail Image

Russian cyberspies blamed for US election hacks are now targeting Macs

Security researchers have discovered a macOS malware program that's likely part of the arsenal used by the Russian cyberespionage group blamed for hacking into the U.S. Democratic National Committee last year. Read More

Thumbnail Image

AI faces hype, skepticism at RSA cybersecurity show

The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype. Read More

Thumbnail Image

What happens if your thermostat is hacked? Researchers name the top 7 security threats

Researchers from the SANS Institute outline the top seven threats that security researchers face this year. Read More

Thumbnail Image
INSIDER

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with cybersecurity skills to help fill critical positions. Read More

Thumbnail Image

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete visibility into employees’ activities, personal interests and more at the click of a button. Read More

Thumbnail Image
INSIDER

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage. Read More

Thumbnail Image

Microsoft's monthlong delay of patches may pose risks

There won't be any patches from Microsoft this month, as the company has decided to bundle them together with the patches scheduled for March. Read More

Video/Webcast: EMA Analyst Research

Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders

Gain actionable insights on how to defend your websites and APIs for the coming year's onslaught of automated threats. Join EMA and Distil Networks live on March 21st @ 1PM EDT as they dive into the latest Distil Networks Bad Bot Report data to reveal 6 high-risk threats every IT security pro must protect against. Read More

CIO Insider

1. Everything you need to know about drive cloning in Windows 10
2. Driving digital strategy with customer journey maps
3. 3 ways AI assistants improve enterprise productivity
4. Tech resume resources: Before and after examples, expert advice and more
5. 13 tech jobs that pay $200k salaries

Editor's Picks

1. What is the point of learning C?
2. Surprise! You don’t own the digital devices you paid for
3. Salesforce skills in high demand in 2017
4. Your guide to top tech conferences
5. What you need to know about the Windows 10 Creators Update
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.