What is MANRS and does your network have it?

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Oct 17, 2016
Featured Image

Survey says many companies want to phase out passwords

Don't be surprised if your company decides to do away with password logins. A new survey has found that most organizations are leaning toward phasing out password authentication. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is MANRS and does your network have it?
Darkweb marketplaces can get you more than just spam and phish
Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones
The OPM breach report: A long time coming
How CSOs can better manage third-party risks
5 affordable MDM options for small businesses
Thousands of online shops compromised for credit card theft
Grey hats and blue skies, dealing with airline security
Yahoo shows that breach impacts can go far beyond remediation expenses

White Paper: NetSupport Inc

Adding Extra Security Without the Added Cost

NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More

Thumbnail Image

What is MANRS and does your network have it?

The Internet Society's Mutually Agreed Norms for Routing Security (MANRS) initiative is designed to provide measures to improve the resilience and security of the internet's routing infrastructure to keep it safe for businesses and consumers. Read More

Thumbnail Image

Darkweb marketplaces can get you more than just spam and phish

Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More

Thumbnail Image

Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and BBQ enthusiast who dubbed the vulnerability Pork Explosion. Read More

Thumbnail Image

The OPM breach report: A long time coming

Congress has finally issued a report on the breach of the federal Office of Personnel Management that exposed the personal information of more than 22 million current and former employees. It comes 15 months after the breach was made public. Read More

Thumbnail Image
Video

How CSOs can better manage third-party risks

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Scott Schneider from CyberGRX, a startup in the third-party risk analysis space, about best practices and tips for CSOs when working on a risk analysis plan with third party vendors. Watch Now

Thumbnail Image

5 affordable MDM options for small businesses

Small and medium sized businesses have embraced BYOD faster than large corporations, but research suggests SMBs aren't taking security seriously. Here are five affordable and easy-to-deploy BYOD management solutions that will get your data secure, without hurting productivity. Read More

Thumbnail Image

Thousands of online shops compromised for credit card theft

Almost 6,000 online shops have been compromised by hackers who added specially crafted code that intercepts and steals payment card details. Read More

Thumbnail Image

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane to gain control of the systems set in place to control it. Read More

Thumbnail Image

Yahoo shows that breach impacts can go far beyond remediation expenses

Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included costs. But the actual numbers could be several times higher. Read More

White Paper: NetSupport Inc

Adding Extra Security Without the Added Cost

NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More

State of the CIO 2017

What projects are CIOs prioritizing in the year ahead? Where are they spending those precious IT dollars? These are the questions that will be answered (with your help!) in our 16th annual State of the CIO survey. Make your voice heard!

Enter the brave new world of Windows 10 license activation

Historically, hardware upgrades on Windows PCs that involved major changes (new motherboard and/or CPU, for example) required a phone call to Microsoft to reactivate the Windows license. Microsoft has altered its licensing policy to cut down on calls. Here’s what happened when we tested this hypothesis.

ERP heads for the cloud

Cloud-based ERP will eventually rule, and on-premises software is destined for legacy status. How can IT ensure a smooth transition?

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.