cyber-criminals

Card Readers at EV Charging Stations - An Easy Target for Cyber Fraud
CIO Review >> News

CIOReview

US states installing card readers at Electric Vehicle charging stations can make it the cyber criminals' next favorite.

IT Disaster Recovery & Cyber Security: Joining Forces for Resiliency
CIO Review >> CXO Insight

Paul J. Dattoli, MS, CBCP, AMBCI, Program Director, IT Disaster Recovery, Lahey Health

Your Cyber Security and IT Disaster Recovery (DR) programs must be closely aligned. Consider the two following questions that get to the heart of the matter.

Mind the Skills Gap: Attracting and Training the Next Generation of Cyber Security Professionals
CIO Review >> CXO Insight

Paige Adams, Group CISO, Zurich Insurance Group

Cybersecurity apprenticeships can help develop talent to fill full-time Cyber positions.

Overcoming the Cybersecurity Talent Shortage
CIO Review >> CXO Insight

Kevin Charest, Divisional SVP and CISO, Health Care Service Corporation

To combat the shortage of professionals, organizations need to invest in STEAM education for the next generation.

Is Manufacturing industry a key target for Cyber attackers
CIO Review >> News

CIOReview

Cyber attackers today are more focused on intellectual property that can bring about long term benefits which puts the manufacturing companies in their radar

Search & Destroy: The Importance of Cyber Threat Sharing In Defeating Cybercrime
CIO Review >> CXO Insight

Gregory Crabb, CISO, VP, United States Postal Service

The Postal Service leverages law enforcement partnerships as a critical component of its overall network security strategy

Rethinking E-Mail Security
CIO Review >> CXO Insight

Karthik Devarajan, Director of IT, Maryland Legal Aid

E-mail protection should not be just restricted to securing the e-mail gateway or having an anti-spam / anti-virus solution.

Automation and Gamification Critical for Cyber Security
CIO Review >> News

CIOReview

The increased threat landscape that the cyber security workforce face, require automation as an essential element to beat cyber attackers.

Do IT Professionals Have a Social Responsibility?
CIO Review >> CIO Viewpoint

Sam Segran, CIO, Texas Tech University

Except for a few involved researchers and interested parties, the world hardly noticed the advent of the internet in 1969 (as ARPANET) when the first host-to-host message was communicated from the University of California.

Safeguarding SMB Customer against Sophisticated Cyberattacks
CIO Review >> News

CIOReview

Cybercrime or cyberattacks has become a major concern for the economies across borders, ranging from states, corporates giants, small and medium industries, and even individuals at home.

Mitigating Malware Attacks with a NSX enabled Zero Trust Network
CIO Review >> CXO Insight

Christopher Frenz, Director, Infrastructure, Interfaith Medical Center

Open up any newspaper or watch any news broadcast and you are bound to be inundated with titles like “Hospital Held for Ransom” or some other expose citing the failure of some organization to withstand their critical corporate data.

Today's Threat Landscape Requires Adaptive Security
CIO Review >> CXO Insight

Dan Joe Barry, VP Positioning and Chief Evangelist, Napatech

The FBI estimated that cyber criminals grossed $1 billion last year from ransomware. They stand to gross considerably more as new ransomware variants emerge that enable the malware to spread more quickly and without any help from humans.

Supporting Business with the Right Technology
CIO Review >> CIO Viewpoint

Andy Jurczyk, CIO, Seyfarth Shaw LLP

When I think about the best example of technology, it’s not the technology itself, but the attitude we as an organization have toward it. We split it up into a couple of categories.

Growing Mobile Trends and Increased Security Concerns
CIO Review >> News

CIOReview

“A pessimist sees the difficulty in every opportunity; an optimist sees the opportunity in every difficulty” Winston Churchill’s inspirational quote draws the perfect metaphor to explain the role of security and mobile devices.

Threat Intelligence: The New Frontier
CIO Review >> CIO Viewpoint

Wes Spencer, CIO, FNB Bank Inc.

In 1941, at the height of World War II, Allied codebreakers were desperate to stop the German advance. One of the keys to victory for the Allies was a secret project known as Ultra.

Managed Print Services: Your Secret Defense Against Internet Security Threats
CIO Review >> CXO Insight

Tim O'Shea, Director MPS Business Development, Oki Data Americas, Inc.

The concept of managed print services (MPS) isn’t a new phenomenon for CIOs, but recent massive denial of service attacks spotlights an existing benefit of MPS for medium and large businesess: keeping printers secure.

DDoS Best Practice - Can You Do It Alone?
CIO Review >> CXO Insight

Russel Ridgley, Head of Cloud Services, Pulsant

DDoS or distributed denial of service attacks are increasingly in the news spotlight — from high-profile breaches like Talk Talk, to the arrest of two teenagers responsible for DDoS for hire services.

Is Hacktivism the New 'Lobbying' or Something More Sinister?
CIO Review >> CXO Insight

Ravi Khatod, CEO, Agari

The threat of cyber criminals pursuing a political agenda and seeking to disrupt critical infrastructures has been well documented.

Redefining Disaster Recovery
CIO Review >> CXO Insight

Randy DeMeno, Chief Technologist-Windows Products & Microsoft Relationship, Commvault

For years, disaster recovery had a simple definition in the world of IT. It meant that you had put in place technologies to recover from a disaster, which had destroyed or rendered unavailable systems and data in your on premise datacenter.

SPARROW Announced the Launch of Single Use Tokens
CIO Review >> News

CIOReview

As a leading payment solutions provider, SPARROW is proud to announce a card-not-present (CNP) solution to combat online fraud and protect consumer data. SPARROW’s Single Use Tokens allow merchants to tokenize and process payments.