Latest articles from CIO magazine

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they’re starting to get in each other’s way

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent…

Report: Average ransomware demand now over $1,000

Report: Average ransomware demand now over $1,000

The average amount of a ransomware demand has increased from $294 in 2015 to $1,077 last year, according to a report released last week by…

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and…

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies…

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if…

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of…

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases…

Cybersecurity industry braces for tighter visa rules

The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest…

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector,…

Report: Cybercriminals prefer Skype, Jabber, and ICQ

The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning.Meanwhile, consumer-grade platforms like…

What it takes to become a data security strategist

By the time John Kronick became a data security strategist a few years ago, he’d already been in the security industry for 20 years. But…

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better,…

Deception technology grows and evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…

Why Linux is a desktop flop

Why Linux is a desktop flop

It’s free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than  Windows. It’s already…

Vendors Releasing Same Software on Parallel Tracks

Dual software releases–one open-source and one commercial–can mean savings and security for buyers.

Five 3D virtual environments for the enterprise

Several companies are offering business-friendly virtual meeting platforms that work right in a Web browser, no software download required, with prices starting at around $50…

Companies Explore Private Virtual Worlds

Companies Explore Private Virtual Worlds

Alternatives to Second Life provide security while boosting productivity Meetings, conferences and training programs in a 3D virtual world such as Second Life can be…

iPads storm the enterprise

Apple’s new application-level encryption paves the way for companies to run business apps on the iPad

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks,…

OppenheimerFunds Gets Return on Investment from Agile and SOA

OppenheimerFunds Gets Return on Investment from Agile and SOA

OppenheimerFunds used to have a data entry efficiency problem. Address changes that customers made on its website had to be manually re-entered into a variety…

Open Source – China’s Bet on Linux

Open Source – China’s Bet on Linux

As China prepares to become a full member of the World Trade Organization, the Beijing government is trying to prove to the West that it…