Why you need a data protection officer

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Jan 27, 2017
Featured Image
INSIDER

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Why you need a data protection officer
Cybercriminals avoid fraud within their own ranks with new site
That online job candidate may be carrying a virus
10 questions to ask IDaaS vendors before you buy
Ransomware makes California nursing school feel ill
Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
Password-free security uses voice, user behavior to verify identity
Machine behaviors that threaten enterprise security
A new service for the less techie criminals
Report: Trump still uses his unsecured Android phone to tweet
Facebook taps into NFC in Android phones for strong account security

White Paper: Veriato, Inc.

5 Steps to Quantifying Insider Risk

Risk is one of those subjective concepts that usually fall into vague categories like "low" and "high" - which has very little meaning on its own, and only has value when you tie those categories to actions (which we will cover later in this guide). Read More

Thumbnail Image

Why you need a data protection officer

Enforcement of the European Union's General Data Protection Regulation (GDPR) is set to start in about 18 months, giving regulators the ability to levy massive fines. Getting ready may require a data protection officer Read More

Thumbnail Image

Cybercriminals avoid fraud within their own ranks with new site

Ironically, cyber criminals have to battle fraudsters too. To help them, a new web service is warning the hacker community who among them can’t be trusted. Read More

Thumbnail Image

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates. Read More

Thumbnail Image
INSIDER

10 questions to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need. Read More

Thumbnail Image

Ransomware makes California nursing school feel ill

About three months ago, an instructor at Gurnick Academy, a California-based nursing school, had his biggest fear come alive. When he tried to access his lectures, the files were encrypted. The teacher was literally locked out of his classroom. Read More

Thumbnail Image
INSIDER

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More

Thumbnail Image

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More

Thumbnail Image

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in order to attack the perimeter. Read More

Thumbnail Image

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More

Thumbnail Image

Report: Trump still uses his unsecured Android phone to tweet

Even after being given a new, secure device just before his inauguration, President Trump still reportedly uses his old phone. Read More

Thumbnail Image

Facebook taps into NFC in Android phones for strong account security

Facebook beefs up its two-factor authentication with support for security keys over NFC on Android phones. Read More

White Paper: Cloudian

Modern, Cloud-conscious Approaches to Data Protection

Most data protection solutions make you choose between two imperfect storage options: high-cost disk or high-maintenance tape. There is a third option: object storage as a backup target. This analyst research note discusses how object storage works, how it uniquely solves the data protection challenge, and how it helps you meet your backup SLAs at 70% less cost than purpose-build backup appliances. Read More

CIO Insider

1. State of the IT contractor job market in 2017
2. Fix Windows 10 problems with these free Microsoft tools
3. The hidden cause of slow Internet and how to fix it
4. 5 rock-solid Linux distros for developers
5. The best (and worst) features of 5 leading ALM suites

Editor's Picks

1. 6 tips to find and retain freelance tech workers
2. When 'off the shelf' software is good enough
3. 10 Evernote tips to organize your info in 2017
4. Digital transformation forces businesses to rethink cybersecurity
5. Why the FCC's latest net neutrality defense is hollow
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.