Cybersecurity

Cybersecurity news, analysis, how-to, opinion and video. | CIO

pixabay cybersecurity stock
stock security

the word

Blockchain: what is it good for, in real-world IT?

Blockchain elicit's big ideas – but how can IT utilize it to make day-to-day life easier?

cybersecurityshutterstock 380217166

What CIOs need to know about authentication

Email is so critical to business communications today that many assume it's a safe and trustworthy medium, but recent cyberattacks prove it's not. What CIOs need to know about authentication and DMARC, a key tool to address this...

artificial intelligence / machine learning / network

Why AI is crucial to cyber security

Why AI is crucial to cyber security

Phishing

After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

A recent cyberattack on a well-known tech company shows that even when the toughest anti-phishing policies are in place, 70% of companies that attempt email authentication leave the final configuration incomplete. The result is that...

insurance cyber attack protection

An executive overview of the Deep & Dark Web

As cybersecurity professionals, we recognize why it’s so important to invest in services and technologies that give us greater visibility into the Deep & Dark Web (DDW). The problem is, these services and technologies often come with...

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

img 20170515 140831 01

To stop future ransomware hacks, CIOs first need to 'swat the mosquitoes'

All too often IT departments can miss the the crucial signs of an incoming ransomware attack. What CIOs can do to avoid becoming the victim of the next global malware hack.

wannacry ransom screenshot

Will macOS protect you from ransomware attacks?

The recent WannaCry ransomware attacks on Windows have some Mac users wondering if they are safe. Is macOS secure from ransomware attacks?

wannacry ransom screenshot

WannaCry: Sometimes you can blame the victims

Last week’s big malware outbreak caused a lot of damage, but organizations that made good decisions ahead of time weren’t affected.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

What is WannaCry? What does WannaCry ransomware do?

Ransomware is a type of malicious software that encrypts your files until you pay a ransom.

Will the WannaCry ransomware serve as a meaningful infosec wake-up call?

Ransomware is no new threat: will WannaCry finally act as a catalyst to a wider infosec wake-up call?

wannacrypt ransom note

New WannaCry variant being monitored, DHS official says

A variant of the WannaCry ransomware has been able to infect some of the computers patched after the original malware struck. But attacks in the U.S. appear to be limited so far.

it security salaries

The NHS ransomware event and security challenges for the U.S healthcare system

The malware attack on the U.K National Health System (NHS) draws attention to the need for urgent building code upgrades in healthcare data security. While short-term fixes may enable hospitals to recover their data and resume normal...

img 20170512 095943

'Perfect storm' of ransomware and network worm hits unprotected computers globally

Enterprises were clearly unprepared. The question is if they'll fare any better the next time around -- and there will likely be a next time.

internet security risk public domain web

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

Load More