Mirai is the hydra of IoT security: too many heads to cut off

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 17, 2017
Featured Image

The NSA's foreign surveillance: 5 things to know

A contentious piece of U.S. law giving the National Security Agency broad authority to spy on people overseas expires at the end of the year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Mirai is the hydra of IoT security: too many heads to cut off
How to remove ransomware: Use this battle plan to fight back
7 tips for developing a powerful data disaster plan
How to navigate the changing landscape of cybersecurity
Continuous authentication: Why it’s getting attention and what you need to know
BlackBerry claims QNX automotive software is safe from CIA
WikiLeaks dump brings CIA spying powers into the spotlight
It's time to turn on HTTPS: the benefits are well worth the effort

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Mirai is the hydra of IoT security: too many heads to cut off

Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway. Read More

Thumbnail Image

How to remove ransomware: Use this battle plan to fight back

Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors. Read More

Thumbnail Image

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an affordable manner that does not break the bank. Read More

Thumbnail Image

How to navigate the changing landscape of cybersecurity

The world of cybersecurity has changed drastically over the past couple of decades. We have evolved from a world of keystroke logging and trojans to a universe of full fledged ransomware and cyber warfare. Read More

Thumbnail Image

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in. Read More

Thumbnail Image

BlackBerry claims QNX automotive software is safe from CIA

Blackberry is claiming its in-vehicle platform, QNX, is safe and the company's not aware of any attacks or exploits after WikiLeaks released CIA documents referencing the OS as a "potential mission area" for hacking. Read More

Thumbnail Image

WikiLeaks dump brings CIA spying powers into the spotlight

Has the CIA ever spied on you? That’s a key question swirling around Tuesday’s WikiLeaks document dump that allegedly detail the U.S. agency’s secret hacking tools. Read More

Thumbnail Image

It's time to turn on HTTPS: the benefits are well worth the effort

The number of websites supporting HTTPS has skyrocketed over the past year and there are many benefits for turning on encryption on your website today. Read More

White Paper: Red Canary

A Guide to Evaluating EDR Products: 15 Critical Questions

When combined with mature security operations and IR processes, EDR tools can help organizations better defend against today's rapidly evolving threats. However, few organizations have the internal resources to build a true EDR capability. Carefully consider your business needs and EDR capabilities as you research solutions. Read More

CIO Insider

1. Understanding Windows 10's Unified Update Platform
2. State of the CIO 2017: More challenging, still complicated
3. The essential guide to anti-malware tools
4. IT Resume Makeover: Find focus by building a theme
5. Why email is safer in Office 365 than on your Exchange server

Editor's Picks

1. AWS, Microsoft and Google take different paths to the cloud
2. Is Sprint about to disappear?
3. Your guide to top tech conferences
4. How microcertifications work for IT job seekers and employers
5. Why Netflix didn’t sink when Amazon S3 went down
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.