Security
/
CIO Security -
1 day ago
The first step in bridging the gap starts with understanding the problem. IT and security operations have worked in silos for decades so one might think “If it ain’t broke, don’t fix it.” But it is, in fact, broken, and there is little awareness...
Security
/
CIO Security -
1 day ago
Follow these steps to protect your websites at the server and workstation.
Security
/
CIO Security -
1 week ago
It was only a matter of time before US created their own version of the EU’S General Data Protection Regulation (GDPR). However, unlike the EU who addresses digital privacy protection on a national level, the US is handling online privacy on the s...
Security
/
CIO Security -
3 weeks ago
Make your own disaster checklist and recovery toolkit before trouble happens.
Security
/
CIO Security -
3 weeks ago
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason Jame...
Security
/
CIO Security -
4 weeks ago
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click "buy now".
Security
/
CIO Security -
1 month ago
Earlier this year, Facebook released an emergency patch after it discovered a software vulnerability in the voice over IP (VoIP) code used in WhatsApp that allowed attackers to remotely install malware on a user’s device by simply placing a call t...
Security
/
CIO Security -
1 month ago
According to an InfoScales report, 95% of successful cyberattacks have human error as the leading cause – most notably company employees falling for phishing scams. This is an important observation as cybersecurity efforts often intuitively focus...
Security
/
CIO Security -
1 month ago
Use these techniques to limit attackers’ ability to compromise systems and websites.
Security
/
CIO Security -
1 month ago
Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure the...
Security
/
CIO Security -
1 month ago
Security breaches always seem to be in the news, but only a handful of organizations are protecting themselves against these threats by actively reducing their cyber-risk exposure. Research by the Ponemon Institute revealed that 63 percent of CISO...
Security
/
CIO Security -
1 month ago
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals little has be...
Security
/
CIO Security -
1 month ago
With the continual vulnerabilities being exploited in applications today it’s important to shed some more light in this area. Many developers and senior tech leaders haven’t yet made the mental switch from “DevOps” to “DevSecOps,” despite some nud...
Security
/
CIO Security -
1 month ago
Insider Pro is teaming up with CertNexus to offer subscribers access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.
Security
/
CIO Security -
1 month ago
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.