November 2016: The month in hacks and breaches

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Dec 12, 2016
Featured Image

The security gift guide

Give the gift of security, so people will give you the gift of not asking for help and advice. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

November 2016: The month in hacks and breaches
Democrats unveil bill to probe Russia's role in alleged election hacks
Obama's cybersecurity recommendations a small step forward, but need teeth and political willpower
A Turkish hacker is giving out prizes for DDoS attacks
Fighting ransomware: A fresh look at Windows Server approaches
U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years
EMV migration delay doesn't let gas stations completely off the hook

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Thumbnail Image
INSIDER

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers. Read More

Thumbnail Image

Democrats unveil bill to probe Russia's role in alleged election hacks

U.S. lawmakers are pushing for a government probe into whether Russia may have interfered with the presidential election by hacking high-profile political targets. Read More

Thumbnail Image

Obama's cybersecurity recommendations a small step forward, but need teeth and political willpower

Last week's report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by $4 billion over the next decade -- but that's not enough to address the current shortfall, experts say Read More

Thumbnail Image

A Turkish hacker is giving out prizes for DDoS attacks

A hacker in Turkey has been trying to encourage distributed denial-of-attacks by making it into a game, featuring points and prizes for attempting to shut down political websites. Read More

Thumbnail Image
INSIDER

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation. Read More

Thumbnail Image

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden. Read More

Thumbnail Image

EMV migration delay doesn't let gas stations completely off the hook

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 -- but that doesn't mean that gas stations can now relax their EMV upgrade plans Read More

White Paper: Palo Alto Networks

10 Thing Your Next Firewall Must Do

Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job. Read More

8 tips for managing without authority

When it comes to managing indirect reports, there's no substitute for experience. Here’s how two project management veterans have found success.

How to reduce Windows 10's on-disk footprint

Over time, as Windows 10 is patched repeatedly, installer files can become outdated or orphaned and occupy a lot of disk space. Two utilities can help with that.

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.