The enterprise is in an arm's race with cybercriminals

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Jul 11, 2016
Featured Image

Standing Strong: How CIOs Can Prepare for Today’s Security Challenges

Cybersecurity has long been a tough issue for CIOs to tackle. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The enterprise is in an arm's race with cybercriminals
What cloud security challenges keep CISOs up at night?
4 tools for managing firewall rules
Researchers add software bugs to reduce the number of… software bugs
Wendy's hack was bigger than thought and exposed credit card data
Confusion over cyber insurance leads to coverage gaps
The truth about bug finders: They're essentially useless
Stuxnet the movie: The U.S. has pwned Iran
Cybersecurity firms step up intel sharing despite issues of trust

White Paper: Dell - Quest Software

Adaptive, Risk-Based Security - The 5 Ws of Access

Security is a moving target. To play it safe, you err on the side of a static approach but users complain that it's restrictive. If your security could adapt to the context of user access, then you could provide the access they need without worrying about stolen user credentials. Read More

Thumbnail Image

The enterprise is in an arm's race with cybercriminals

CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering / phishing in order to better arm personnel. Read More

Thumbnail Image

What cloud security challenges keep CISOs up at night?

With the network perimeter wide open, see what chief security officers can do to keep everything secure? Read More

Thumbnail Image
INSIDER

4 tools for managing firewall rules

Poorly managed firewall rules can lead to security disasters. Here, security managers in the IT Central Station community review the top firewall management suites: Tufin, AlgoSec, FireMon and RedSeal. Read More

Thumbnail Image

Researchers add software bugs to reduce the number of… software bugs

A new strategy for training bug-finding tools could help catch more vulnerabilities. Read More

Thumbnail Image

Wendy's hack was bigger than thought and exposed credit card data

A data breach that hit Wendy's fast food restaurants targeted customer credit card information and was more than three times bigger than originally disclosed. Read More

Thumbnail Image

Confusion over cyber insurance leads to coverage gaps

Cyber insurance may be a booming business thanks to the high-profile breaches, but the market for such policies is a complicated, say experts from SANS Institute, Advisen and PivotPoint. Read More

Thumbnail Image

The truth about bug finders: They're essentially useless

Today's popular bug finders catch only about two percent of the vulnerabilities lurking in software code, researchers have found, despite the millions of dollars companies spend on them each year. Read More

Stuxnet the movie: The U.S. has pwned Iran

The new documentary about Stuxnet, ‘Zero Days’, says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country’s infrastructure and could be used as a weapon in any future war. Read More

Thumbnail Image

Cybersecurity firms step up intel sharing despite issues of trust

The war against the cyber criminals won’t be won alone. To keep the hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition. Read More

White Paper: Trend Micro Incorporated

Charting a New Course for IT Security with Coordinated Threat Defenses

Effectively thwarting modern malware and targeted attacks requires a new level of integration and coordination among traditional domain-level controls and next-generation, centralized security analysis, correlation, and management systems. Read More

Meet the 2016 CIO 100 winners

The annual awards honor 100 organizations that deliver innovation and business value from IT. This year’s winners are serious about winning customers and driving revenue.

MOOCs put a new spin on professional development

MOOCs -- free Massive Open Online Courses -- can bring agility and efficiency to enterprise IT training and skills development. Here's how to choose wisely.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.