CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Doctor monitoring patient using medical devices showing internet of medical things
Cyber SecurityInsights

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

Silhouettes of engineers working in blurry data center showing privacy challenges

The Privacy Triangle: Emerging Privacy Expectations and Challenges

Website of GitHub showing malicious code in code repositories

Tens of Thousands of GitHub Code Repositories Cloned With Malicious Code Added; Hacker Claims Campaign Was Elaborate Bug Bounty Effort

Teenagers using their phones looking stressed over Emergency Alert Systems with vulnerable software

Chief Engineer: FEMA Emergency Alert Systems at Risk of Hacking Due to Vulnerable Software

Security operations center (SOC) with monitors on the wall
Cyber SecurityInsights

How Using an SOC-as-a-Service Can Allow You to Focus On Your Core Business

DIgital globe showing USA Patriot Act and privacy-first data sharing
Cyber SecurityInsights

The USA PATRIOT Act: How CPOs Can Adopt a Privacy-First Approach To Secure Data Collaboration

Unlocked security lock on a bunch of keys showing security breach by ransomware gang of identity management company
Cyber SecurityNews

Identity Management Firm Entrust Suffers a Security Breach, Ransomware Gang Obtains Files

Data Privacy

Man using mobile phone while walking on a crowded Indonesia street showing internet regulation
Data PrivacyNews

Paypal, Yahoo, Other Popular Sites Blocked as Indonesian Internet Regulation Goes Into Effect

Safari browser icon on laptop screen showing Safari privacy and private click management

Mozilla: Apple “Private Click Management” Not a Net Positive for Consumers, Safari Privacy Can Still Be Compromised by Cross-site Tracking

Business woman sitting on the floor with a laptop looking at smartphone showing customer trust

The Secret To Earning Your Customers’ Trust May Lie in Giving Them More Control Over Their Personal Information

Stethoscope over computer keyboard with a security lock showing medical data privacy

How CPOs Can Protect Medical Data Privacy in a Post-Dobbs America

Crowded street in India showing Delhi police seized payment data

India’s Razorpay Under Fire for Sharing Nonprofit Payment Data With Delhi Police

Video surveillance system on pole in city showing SFPD real-time access to surveillance cameras

SFPD Is Seeking Unfettered Real-Time Access to San Francisco’s Private Surveillance Cameras

Hand holding instructions of Amazon Ring Video Doorbell showing surveillance footage access by law enforcement

Ring Doorbell Surveillance Footage Accessed by Law Enforcement Without Warrants or Owner Consent

Data Protection

Indian government building in New Delhi, India showing big tech companies pushback personal data protection bill
Data ProtectionNews

After Pushback From Big Tech Companies, India Scraps Personal Data Protection Bill and Starts Over

Judge gavel on the background of the US flag showing federal privacy law impact on tech companies

Tech Companies, Buckle Up. Things Are About To Get Even Bumpier With Data Privacy

Big Ben and Westminster Bridge with traffic showing data reform bill and marketing data

Data Reform Bill: A Data Marketer’s Viewpoint

Big Ben and Westminster Bridge with traffic showing UK data protection reform and AI regulation

Details of UK Data Protection Reform Bill, Proposals for AI Regulation Come To Light

Google account signup process on smartphone screen showing consumer groups privacy complaint

Google Account Signup Process Target of New Privacy Complaint From Consumer Groups; Language, Prompts Called Confusing and Misleading

Tower bridge in the early morning hours showing UK Data Protection Act reforms

Terms of UK Data Protection Act Reform Take Shape as DCMS Publishes Response to Consultation Proposals

US Chamber of commerce facade showing opposition to federal privacy law

US Chamber of Commerce Opposes “Unworkable” Federal Privacy Law Despite Popular Support, Cites Override of State Law and Right to Private Action

Cyber Security

London emergency ambulance responding at night showing cyber attack on NHS 111 caused system outage
Cyber SecurityNews

NHS 111 System Experiencing Disruption Due to Cyber Attack, System Outage May Impact Services for Several Days

Hacker typing in login screen showing stolen credentials

Why Does Every Hack Involve Stolen Credentials? Because It Works Every Time

Open security lock and key with Twitter in the background showing zero-day security breach impact on anonymous accounts

Twitter Confirms Zero-Day Security Breach Exposed Anonymous Accounts

Telegram app on a smartphone showing malware and messaging apps

Hackers Exploit Messaging Apps To Distribute Malware and Store Stolen Data

Processors and circuit board in blue glowing laser showing quantum computing threat to cryptographic standards

Quantum Computing Threat Treated With Increasing Seriousness by Federal Government With Announcement of New Cryptographic Standards and Tools

Developer coding using laptop showing API security

API Security 101: The Ultimate Guide

Facade of Palace Palazzo Chigi seat of Italy government showing Lockbit ransomware attack on tax agency

Suspected Lockbit Ransomware Attack on Italian Tax Agency Potentially Leaked About 100 GB of Data

Get Connected

Recent Posts

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

Silhouettes of engineers working in blurry data center showing privacy challenges

The Privacy Triangle: Emerging Privacy Expectations and Challenges

Website of GitHub showing malicious code in code repositories

Tens of Thousands of GitHub Code Repositories Cloned With Malicious Code Added; Hacker Claims Campaign Was Elaborate Bug Bounty Effort

Teenagers using their phones looking stressed over Emergency Alert Systems with vulnerable software

Chief Engineer: FEMA Emergency Alert Systems at Risk of Hacking Due to Vulnerable Software

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results