Microsoft's president wants a Geneva Convention for cyberwar

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Feb 17, 2017
Featured Image
INSIDER

Secrets of successful CISOs [Infographic]

Who the CISO reports to matters more than you might think, but it isn’t the only secret to success. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft's president wants a Geneva Convention for cyberwar
Rise of as-a-service lowers bar for cybercriminals
Microsoft shelves all February security updates
Worried about hacks, senators want info on Trump’s personal phone
Heartbreaking hacks
Forget the network perimeter, say security vendors
Russian cyberspies blamed for US election hacks are now targeting Macs
Deletion is not destruction: ensuring the permanent removal of data
Doubts abound over US action on cybersecurity
To pay or not to pay: Too many victims say yes to ransomware
Report: some small cities have surprisingly high number of exposed devices

White Paper: Intel Security

Bust the myth of the malware "silver bullet."

"Silver bullet" solutions might provide initial malware relief. But they'll never protect endpoints from emboldened cybercriminals like a coordinated security platform will. Only our endpoint defense combats emerging threats while simplifying your security operations. All, with traditional protection, advanced analytics, and containment throughout the threat lifecycle. Read the white paper. Read More

Thumbnail Image

Microsoft's president wants a Geneva Convention for cyberwar

Microsoft is calling for a “Digital Geneva Convention,” as global tensions over digital attacks continue to rise. The tech giant wants to see civilian use of the internet protected as part of an international set of accords, Brad Smith, the company’s president and chief legal officer, said in a blog post. Read More

Thumbnail Image

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime Read More

Thumbnail Image

Microsoft shelves all February security updates

Microsoft today took the unprecedented step of postponing an entire month's slate of security updates for Windows and its other products. Read More

Thumbnail Image

Worried about hacks, senators want info on Trump’s personal phone

Two senators have written to the U.S. Department of Defense about reports that President Donald Trump may still be using an old unsecured Android phone, including to communicate through his Twitter account. Read More

Thumbnail Image

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users. Read More

Thumbnail Image

Forget the network perimeter, say security vendors

Security vendors start embracing Google's BeyondCorp network security model that treats all apps and devices as being on the Internet instead of assigning higher trust to local networks. Read More

Thumbnail Image

Russian cyberspies blamed for US election hacks are now targeting Macs

Security researchers have discovered a macOS malware program that's likely part of the arsenal used by the Russian cyberespionage group blamed for hacking into the U.S. Democratic National Committee last year. Read More

Thumbnail Image

Deletion is not destruction: ensuring the permanent removal of data

Data destruction must be absolute, banishing any uncertainties among executives or worries among consumers. Read More

Thumbnail Image

Doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election. Read More

Thumbnail Image

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s just that not many organizations follow the free advice. Read More

Thumbnail Image

Report: some small cities have surprisingly high number of exposed devices

This morning, Trend Micro released a report about the exposed cyberassets in the top U.S. cities and most critical industry segments -- and in many cases, it was the smaller municipalities that had the largest number of problems. Read More

White Paper: Red Canary

A Guide to Evaluating EDR Products: 15 Critical Questions

When combined with mature security operations and IR processes, EDR tools can help organizations better defend against today's rapidly evolving threats. However, few organizations have the internal resources to build a true EDR capability. Carefully consider your business needs and EDR capabilities as you research solutions. Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. What's next for Azure Site Recovery?
3. What IT security pros are earning in 2017
4. How to prevent a bad case of cloud buyer’s remorse
5. 4 reasons Microsoft Teams will kill Slack… and 4 reasons it won’t

Editor's Picks

1. 15 data and analytics trends that will dominate 2017
2. How to track employee well-being as a KPI
3. 7 leadership traits of successful CIOs
4. Samsung Galaxy S8: What we know so far
5. Lessons from the rise and fall of an open source project
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.