McAfee on its own as independent security vendor

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Apr 07, 2017
Featured Image

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies and best practices to prevent a company-wide attack. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

McAfee on its own as independent security vendor
March 2017: The month in hacks and breaches
Don't pay ransoms. But if you must, here's where to buy the Bitcoins
Privacy rollback can cause headaches for corporate security pros
A free decryption tool is now available for all Bart ransomware versions
IT leaders share how they quell cybersecurity attacks
Politicians' web browsing history targeted after privacy vote
Chinese hackers go after third-party IT suppliers to steal data

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

McAfee on its own as independent security vendor

McAfee has officially spun out from Intel, dumping the name Intel Security and under new majority ownership that has deep pockets to help the company more aggressively acquire technology via mergers and acquisitions to supplement its home-grown innovations. Read More

Thumbnail Image
INSIDER

March 2017: The month in hacks and breaches

Voter records, patient data, and CIO hacking tools were among the data stolen last month. Read More

Thumbnail Image

Don't pay ransoms. But if you must, here's where to buy the Bitcoins

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups. But what if your defenses fail, your backups are inadequate, all attempts to restore the data fail, and you have to pay the ransom after all -- what do you do? Read More

Thumbnail Image

Privacy rollback can cause headaches for corporate security pros

Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity. Read More

Thumbnail Image

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware. Read More

Thumbnail Image

IT leaders share how they quell cybersecurity attacks

Three IT executives discuss their greatest cybersecurity fears and some of their favorite tools they use to quell them. Read More

Thumbnail Image

Politicians' web browsing history targeted after privacy vote

Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission. Read More

Thumbnail Image

Chinese hackers go after third-party IT suppliers to steal data

Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers. Read More

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

CIO Insider

1. Enter the brave new world of Windows 10 license activation
2. 12 common project management mistakes — and how to avoid them
3. 7 ways to create a successful integrated marketing campaign
4. How to fix five Windows 10 headaches
5. 10 reasons to look for a new job

Editor's Picks

1. Potential Oracle acquisition of Accenture brings new digital twist
2. 6 soft skills employers should be looking for in tech talent
3. New Fitbit Alta HR sleep tracking could be eye-opening
4. 9 biggest information security threats through 2019
5. How CIOs are transforming their organizations for the digital era
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.