There’s a war on for cybersecurity talent

Email not displaying correctly? View it in your browser.

CIO

CIO Security

Nov 14, 2016
Featured Image

Worries and uncertainty cloud outlook for digital privacy under President Trump

When President-elect Donald Trump officially takes office, he’ll inherit a powerful U.S. surveillance apparatus, including the National Security Agency, that’s already been accused of trampling over privacy rights. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

There’s a war on for cybersecurity talent
How to protect your marketing team amidst security threats
Why senior managers are the most dangerous negligent insiders
Yahoo investigating if insiders knew of hack

eGuide: Citrix Systems

eGuide: A Mobile Security Strategy for Your Workforce

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

Thumbnail Image

There’s a war on for cybersecurity talent

Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions. Read More

Thumbnail Image

How to protect your marketing team amidst security threats

Protect your marketing team as security threats loom with these tips and best practices. Read More

Thumbnail Image
INSIDER

Why senior managers are the most dangerous negligent insiders

If you really want to move the needle on data security in your organization, start at the top. Read More

Thumbnail Image

Yahoo investigating if insiders knew of hack

Yahoo said investigators were looking into the possibility that some people within the company knew at the time about the late 2014 theft of information of at least 500 million user accounts. Read More

White Paper: Bay Dynamics

Enterprise Cyber Risk Management - Protecting IT Assets that Matter

Protecting IT assets is a complicated business. With so many moving parts and concerns, security teams can be overwhelmed by the threats and vulnerabilities barraging their enterprises every day. How can security teams ensure they are addressing the right threats and vulnerabilities that could lead to a compromise of their crown jewels? Read More

5 strategies to reboot your IT career

Whether you cut your teeth on Unix and AIX or you tire of doing the necessary but thankless tasks that come with keeping the lights on and the datacenter humming, there's still time to reinvent yourself. Start here!

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP. Go now!

A chance to win $500? Take Computerworld's 2017 Salary Survey

The annual salary survey shines a bright light on IT compensation. The more respondents, the better the results will be – and participants can enter a drawing to win 1 of 3 $500 American Express gift checks. Take the 2017 IT Salary Survey today.

Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Security as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.