Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »
security

security - News, Features, and Slideshows

Most popular

security in pictures

News about security
Tutorials about security
  • How to protect yourself against privileged user abuse

    By By Michael Crouse | 28 June, 2014 04:12

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • Six ways to prevent a breach like the one at AT&T

    By Antone Gonsalves | 18 June, 2014 22:42

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • 5 Ways to Prevent Data Loss in Mobile Environments

    By Kim Lindros and Ed Tittel | 20 March, 2014 13:15

    Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.

  • How to Test the Security Savvy of Your Staff

    By Kim Lindros and Ed Tittel | 24 February, 2014 13:58

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

  • 5 Tips to Keep Your Data Secure on the Cloud

    By Victoria Ivey | 16 December, 2013 22:15

    The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening.

Features about security

Whitepapers about security

Computerworld
ARN
Techworld
CMO