Drones could help with disasters like Hurricane Matthew

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Oct 10, 2016
Featured Image

Security vs. privacy: The endless fiery debate continues

The debate about security vs. privacy has been going on since governments existed. It got a lot of discussion this week at the Cambridge Cyber Summit, but it remains unresolved. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Drones could help with disasters like Hurricane Matthew
FCC to vote on strict privacy rules for ISPs in late October
How Shodan helped bring down a ransomware botnet
What CSOs can learn from the Yahoo breach
Down but not out of options: How to keep IT security together in a company that's gone bankrupt
How companies can deal with insider data theft
How to shield your company from cyber enforcement

eBook: Amazon Web Services

Building a Data Lake on AWS

Data Lake is a new and increasingly popular way to store and analyze data that addresses many of these challenges. Data Lake allows an organization to store all of their data, structured and unstructured, in one, centralized repository. Since data can be stored as-is, there is no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand. Read More

Thumbnail Image

Drones could help with disasters like Hurricane Matthew

Emergency personnel could use 'flying hot spots' to communicate in remote places where wireless antennas were lost or unavailable. Read More

Thumbnail Image

FCC to vote on strict privacy rules for ISPs in late October

The U.S. Federal Communications Commission will push forward with controversial privacy regulations that would require broadband providers to get customer permission before using and sharing geolocation, browsing histories, and other personal information. Read More

Thumbnail Image

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that their infrastructure is locked down. This summer, it was also used by security researchers and law enforcement to shut down a ransomware botnet. Read More

Thumbnail Image
Video

What CSOs can learn from the Yahoo breach

In the latest episode of Security Sessions, CSO Editor-in-chief Joan Goodchild talks about the implications of the Yahoo data breach, in which up to 500 million accounts were hacked. Joining Goodchild in the discussion is Kevin O'Brien, CEO and founder of GreatHorn, who offers advice to CSOs and other IT security leaders on ways to learn from this particular breach. Watch Now

Thumbnail Image

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

If you're working for a company that's filed for bankruptcy, you're definitely going to encounter choppy waters when it comes to maintaining tech security. We talked to IT pros who have been through it to find out the best ways to cope. Read More

Thumbnail Image

How companies can deal with insider data theft

To learn that your company's data was stolen, not from any hacker, but from an employee is the nightmare scenario that no one wants to face. But it's also a risk that's very real. Read More

How to shield your company from cyber enforcement

Regulators and regulations are getting more stringent. You need a living, breathing and constantly evolving governance framework, but insurance is also critical Read More

Video/Webcast: Amazon Web Services

Building a Data Lake on AWS with APN Partners

In this webinar, you will learn about Data Lakes on AWS and how APN Partners (47Lining, Cloudwick and NorthBay) can help you quickly and cost-effectively deploy a Data Lake that meets your business needs. Read More

State of the CIO 2017

What projects are CIOs prioritizing in the year ahead? Where are they spending those precious IT dollars? These are the questions that will be answered (with your help!) in our 16th annual State of the CIO survey. Make your voice heard!

Enter the brave new world of Windows 10 license activation

Historically, hardware upgrades on Windows PCs that involved major changes (new motherboard and/or CPU, for example) required a phone call to Microsoft to reactivate the Windows license. Microsoft has altered its licensing policy to cut down on calls. Here’s what happened when we tested this hypothesis.

ERP heads for the cloud

Cloud-based ERP will eventually rule, and on-premises software is destined for legacy status. How can IT ensure a smooth transition?

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.