Remain paranoid, err vigilant, with online security in 2017

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 23, 2016
Featured Image

The 10 biggest hacks, breaches, and security stories of 2016

>From hacks at Yahoo and the DNC to the rise of IoT botnets, these are the biggest security stories of 2016. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Remain paranoid, err vigilant, with online security in 2017
Top 4 security trends of 2016
Cybersecurity confidence gets a C- . How to improve your grade in 2017
Mobile banking trojans adopt ransomware features
How to get more from your security budget
The year ransomware became one of the top threats to enterprises
How a dose of AI could be the cure for hospital EHR cyberattacks in 2017
The 15 best job markets for IT security specialists
Tech companies like Privacy Shield but worry about legal challenges

White Paper: Fortinet, Inc.

Advanced Threats, Advanced Solutions: Integrating a Sandbox Into Your Infrastructure

The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More

Thumbnail Image
INSIDER

Remain paranoid, err vigilant, with online security in 2017

You didn’t think we were going to say you can now relax your security awareness training, did you? Read More

Thumbnail Image

Top 4 security trends of 2016

As digital transformation overtook the enterprise in 2016, security professionals have struggled to keep up with a shifting technology and cultural landscape while keeping one eye ahead on the threat horizon. Read More

Thumbnail Image

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about their overall confidence that the world’s cyber defenses are meeting expectations. Read More

Thumbnail Image

Mobile banking trojans adopt ransomware features

Cybercriminals are adding file-encrypting features to traditional mobile banking trojans, creating hybrid threats that steal sensitive information and lock user files at the same time. Read More

Thumbnail Image
INSIDER

How to get more from your security budget

Here’s how to get more from your stretched security budget. Read More

Thumbnail Image

The year ransomware became one of the top threats to enterprises

Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data. Read More

Thumbnail Image

How a dose of AI could be the cure for hospital EHR cyberattacks in 2017

We are all sick (literally) and tired of the endless rounds of 'catch the data thief' playing at a hospital near you. Since these hospital attacks begin in 2014, they seem to get worse each year. Now industry pundits are indicating that 2017 will be the worst year yet. Santa might have to turn in his sleigh for an EMS truck, but not one loaded with security solutions that are better left on the Island of Misfit Toys. Read More

Thumbnail Image
INSIDER

The 15 best job markets for IT security specialists

Here is a look at the top 15 job markets for information security professionals, according to the recent study, “Where Are the Highest Paying Tech Jobs in the US” from Indeed.com. Read More

Thumbnail Image

Tech companies like Privacy Shield but worry about legal challenges

Privacy Shield, the new international framework allowing companies to transfer customer data between the EU and the U.S., is getting good reviews so far, but some companies aren't betting on it for the long term. Read More

White Paper: Fortinet, Inc.

Best Practices in Network Segmentation for Security

With the rise of BYOD, cloud-based services, and IoT, network boundaries are expanding and becoming increasingly difficult to secure. The enterprise perimeter is often penetrated and once inside, malware can move through the network, launching a devastating attack. In this research note by Gartner, learn how to implement better network segmentation to reduce or eliminate threats from spreading throughout your network. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.