People are (still) the biggest security risks

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Mar 28, 2016
Featured Image
INSIDER

Why IT can’t handle data breaches alone

"The entire C-suite and board is on the hot seat for security these days," says Matthew Karlyn. And that makes data breaches everyone's business. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

People are (still) the biggest security risks
Belgium attacks reinforce that security is everybody’s problem
Searching for a path to IoT security
Justice Department indicts Iran hackers in massive financial cyberattack
Verizon's breach experts missed one right under their noses
FBI chief shoots down theory that NAND mirroring will be used to crack terrorist's iPhone
Malware authors quickly adopt SHA-2 through stolen code-signing certificates

White Paper: CompTIA

Cybersecurity for Everyone, Not Just the IT Department

It's the worst case scenario. You've just been notified that your company has experienced a data breach. How did this happen? It's a question that a growing list of CIOs have grappled with recently. Read More

Thumbnail Image

People are (still) the biggest security risks

Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately. Read More

Thumbnail Image

Belgium attacks reinforce that security is everybody’s problem

In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the reality is that security is something we all need to own. Read More

Thumbnail Image

Searching for a path to IoT security

A discussion with a security expert and IoT security skeptic leads to a consensus on how to find an appropriate balance of risk to value in IoT applications. Read More

Thumbnail Image

Justice Department indicts Iran hackers in massive financial cyberattack

The U.S. Department of Justice has indicted seven Iranians in connection with cyber attacks on U.S. banks, the New York Stock Exchange, AT&T and a water facility in New York, according to published reports. Read More

Thumbnail Image

Verizon's breach experts missed one right under their noses

Verizon Enterprise, a bulwark against cyberattacks at many large organizations, has suffered a security breach itself. Read More

Thumbnail Image

FBI chief shoots down theory that NAND mirroring will be used to crack terrorist's iPhone

FBI Director James Comey denied that the agency's mysterious "outside party" had proposed digitally copying the contents of the processor in the San Bernardino terrorist's iPhone as the solution to gaining access to the device's data. Read More

Thumbnail Image

Malware authors quickly adopt SHA-2 through stolen code-signing certificates

Researchers from Symantec have recently found samples of the Carberp.B online banking Trojan that were digitally signed with two stolen certificates: one using a SHA-1 signature and one using a SHA-2 signature. Read More

Video/Webcast: Centrify Corporation

They Have All Our Passwords. It's Time for MFA Everywhere.

Learn about how to stop attackers in their tracks with MFA and the steps to take to further mitigate risk from compromised credentials. Read More

10 tips for CIOs looking for a seat on the board

Here’s how IT leaders from Procter & Gamble, Biogen and Google Ventures secured their seats. Learn more

The dirty dozen: 12 cloud security threats

These are the top security threats organizations face when using cloud services. Meet the 'Treacherous 12

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.