DDoS attack on Dyn could have been prevented

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Nov 07, 2016
Featured Image
INSIDER

What these CSOs did on their first days

There are a million things to worry about but these chief security officers provide advice on how to start off on the right foot. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

DDoS attack on Dyn could have been prevented
Fixing the communications breakdown between IT security and the board and c-suite
10 AWS security blunders and how to avoid them
Cisco seeks faster time to discovery for breaches, compromises
Black Hat Europe: IoT devices can hack phones
Flood of threat intelligence overwhelming for many firms
Collaborative defense, the shift from ‘what’ to ‘how’
Protection of white-hat hackers slow in coming

Video/Webcast: Kaspersky Lab Inc.

Taking the Mystery Out Of Ransomware

When it comes to ransomware, the damage it can do to your company is immense. Many companies are perplexed by ransomware and the steps they need to take to protect themselves, but there's no reason to remain in the dark. Join us for this informative webinar presented by Michael Mimoso from Kaspersky Lab's GReAT team as we take the mystery out of this growing threat. Read More

Thumbnail Image

DDoS attack on Dyn could have been prevented

The Online Trust Association issued a prescription earlier this year for securing IoT devices. But even the association’s director admits that, with billions of devices already in use, change will not come easily or quickly. Read More

Thumbnail Image
INSIDER

Fixing the communications breakdown between IT security and the board and c-suite

Stop buying the first security solution that comes down the pike and solve the communications logjam first. Read More

Thumbnail Image

10 AWS security blunders and how to avoid them

Amazon Web Services is easy to work with -- but can easily compromise your environment with a single mistake Read More

Thumbnail Image

Cisco seeks faster time to discovery for breaches, compromises

Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures. Read More

Thumbnail Image

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones. Read More

Thumbnail Image

Flood of threat intelligence overwhelming for many firms

Three years after Target missed alerts warning them abut a massive data breach, the amount of threat information coming in from security systems is still overwhelming for many companies, due to lack of expertise and integration issues. Read More

Thumbnail Image

Collaborative defense, the shift from ‘what’ to ‘how’

The focus of this year’s Advanced Cyber Security Center conference highlighted the value of using information sharing as a means of helping others to defend against malicious cyber activity. Read More

Thumbnail Image

Protection of white-hat hackers slow in coming

Laws forbidding hacking into computers are meant to block the theft of intellectual property, music and movie piracy and other criminal activity. But they also have the unintended effect of blocking legitimate cybersecurity research. Security companies are working to change that. Read More

Downloadable Asset: ProtectWise

5 Blind Spots That Kill Cybersecurity

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners are tasked with responding to incidents on their network that they may not even know exist until they've already become full-fledged breaches. Read More

Evaluating PaaS? Focus on speed, compliance and cost

As tech giants battle for cloud dominance, businesses looking to offload heavy-duty infrastructure tasks are reaping hefty rewards from platform-as-a-service offerings. Here’s how three IT leaders mixed and matched their powerful yet flexible PaaS packages.

Inside a hyperscale data center (how different is it?)

CIO.com took a tour of Microsoft’s hyperscale data center in Quincy, Washington. What we saw shows how far cloud data centers have come in a decade.

A chance to win $500? Take Computerworld's 2017 Salary Survey

The annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey today.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.