Microsoft patches 68 vulnerabilities, two actively exploited ones

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Nov 11, 2016
Featured Image

The worst people you meet doing IT security

Now I've collected specific kinds of insecure employees that infosec workers have had to deal with and protect—or protect their servers from. You'll definitely recognize people you work with on this list. Hopefully you won't recognize yourself. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft patches 68 vulnerabilities, two actively exploited ones
Why assuming data is secure is dangerous and stupid
Hackers can abuse LTE protocols to knock phones off networks
AI makes security systems more flexible
7 steps to start a bug bounty program
Los Angeles: Warm weather, movie stars -- and 100 million monthly cyberattacks
Robots present a cyber risk

eGuide: Citrix Systems

eGuide: A Mobile Security Strategy for Your Workforce

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

Thumbnail Image

Microsoft patches 68 vulnerabilities, two actively exploited ones

Microsoft has patched 68 vulnerabilities in Windows, Office, Edge, Internet Explorer and SQL Server, two of which have already been exploited by attackers in the wild and three that have been publicly disclosed. Read More

Thumbnail Image

Why assuming data is secure is dangerous and stupid

The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure. Read More

Thumbnail Image

Hackers can abuse LTE protocols to knock phones off networks

The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed. Read More

Thumbnail Image

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate. Read More

Thumbnail Image

7 steps to start a bug bounty program

Paul Ross, senior vice preside of marketing at Bugcrowd breaks down how to get started with a bug bounty program, and how to prepare your organization for this new approach to vulnerability testing. Read More

Thumbnail Image

Los Angeles: Warm weather, movie stars -- and 100 million monthly cyberattacks

A $1.8 million Integrated Security Operations Center, opened in late 2015, consolidates threat intelligence from what previously was carried out in four different locations. Read More

Thumbnail Image

Robots present a cyber risk

The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization. Read More

White Paper: Bay Dynamics

Enterprise Cyber Risk Management - Protecting IT Assets that Matter

Protecting IT assets is a complicated business. With so many moving parts and concerns, security teams can be overwhelmed by the threats and vulnerabilities barraging their enterprises every day. How can security teams ensure they are addressing the right threats and vulnerabilities that could lead to a compromise of their crown jewels? Read More

Evaluating PaaS? Focus on speed, compliance and cost

As tech giants battle for cloud dominance, businesses looking to offload heavy-duty infrastructure tasks are reaping hefty rewards from platform-as-a-service offerings. Here’s how three IT leaders mixed and matched their powerful yet flexible PaaS packages.

Inside a hyperscale data center (how different is it?)

CIO.com took a tour of Microsoft’s hyperscale data center in Quincy, Washington. What we saw shows how far cloud data centers have come in a decade.

A chance to win $500? Take Computerworld's 2017 Salary Survey

The annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey today.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.