CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Lock and money on laptop keyboard showing ransomware payments ban
Cyber SecurityNews

Patchwork of US State Regulations Becomes More Complex as Florida, North Carolina Ban Ransomware Payments

Man buying from online ecommerce shop showing fraud prevention for cross-border trade

Best Practices in Fraud Prevention and CX for Cross-Border Trade

Facial recognition on street surveillance cameras showing facial recognition ban for law enforcement

Facial Recognition Bans Begin To Fall Around the US as Re-Funding of Law Enforcement Becomes Politically Popular

Notepad with Slack logo messaging app showing Slack bug affecting hashed password

Five-Year-Old Slack Bug Transmitted Your Hashed Password After Interacting With a Sharing Feature

Man using a digital tablet to discuss information showing cybersecurity maturity of cybersecurity team

The Core Attributes of a Mature Security Team

Man holding mobile phone showing SMS phishing attack
Cyber SecurityNews

SMS Phishing Attack Compromised Twilio Leaking Customer Data, Targeted Cloudflare

Digital yuan gold coin over yuan banknotes showing PBOC privacy protection for CBDC
Data PrivacyNews

Privacy Protection Coming for Digital Yuan? PBOC Promises “Respect” for Personal Information

World map on a technological background showing data privacy laws and cross-border data sharing
Data ProtectionInsights

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Data Privacy

Boy using phone in bed at night showing cyber safety and end-to-end encryption
Data PrivacyNews

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Silhouettes of engineers working in blurry data center showing privacy challenges

The Privacy Triangle: Emerging Privacy Expectations and Challenges

Man using mobile phone while walking on a crowded Indonesia street showing internet regulation

Paypal, Yahoo, Other Popular Sites Blocked as Indonesian Internet Regulation Goes Into Effect

Safari browser icon on laptop screen showing Safari privacy and private click management

Mozilla: Apple “Private Click Management” Not a Net Positive for Consumers, Safari Privacy Can Still Be Compromised by Cross-site Tracking

Business woman sitting on the floor with a laptop looking at smartphone showing customer trust

The Secret To Earning Your Customers’ Trust May Lie in Giving Them More Control Over Their Personal Information

Stethoscope over computer keyboard with a security lock showing medical data privacy

How CPOs Can Protect Medical Data Privacy in a Post-Dobbs America

Data Protection

Man using magnifying glass showing SOC 2 for data protection
Data ProtectionInsights

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

Indian government building in New Delhi, India showing big tech companies pushback personal data protection bill

After Pushback From Big Tech Companies, India Scraps Personal Data Protection Bill and Starts Over

Judge gavel on the background of the US flag showing federal privacy law impact on tech companies

Tech Companies, Buckle Up. Things Are About To Get Even Bumpier With Data Privacy

Big Ben and Westminster Bridge with traffic showing data reform bill and marketing data

Data Reform Bill: A Data Marketer’s Viewpoint

Big Ben and Westminster Bridge with traffic showing UK data protection reform and AI regulation

Details of UK Data Protection Reform Bill, Proposals for AI Regulation Come To Light

Google account signup process on smartphone screen showing consumer groups privacy complaint

Google Account Signup Process Target of New Privacy Complaint From Consumer Groups; Language, Prompts Called Confusing and Misleading

Tower bridge in the early morning hours showing UK Data Protection Act reforms

Terms of UK Data Protection Act Reform Take Shape as DCMS Publishes Response to Consultation Proposals

Cyber Security

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue
Cyber SecurityNews

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

Website of GitHub showing malicious code in code repositories

Tens of Thousands of GitHub Code Repositories Cloned With Malicious Code Added; Hacker Claims Campaign Was Elaborate Bug Bounty Effort

Get Connected

Recent Posts

Lock and money on laptop keyboard showing ransomware payments ban

Patchwork of US State Regulations Becomes More Complex as Florida, North Carolina Ban Ransomware Payments

Man buying from online ecommerce shop showing fraud prevention for cross-border trade

Best Practices in Fraud Prevention and CX for Cross-Border Trade

Facial recognition on street surveillance cameras showing facial recognition ban for law enforcement

Facial Recognition Bans Begin To Fall Around the US as Re-Funding of Law Enforcement Becomes Politically Popular

Notepad with Slack logo messaging app showing Slack bug affecting hashed password

Five-Year-Old Slack Bug Transmitted Your Hashed Password After Interacting With a Sharing Feature

Man using a digital tablet to discuss information showing cybersecurity maturity of cybersecurity team

The Core Attributes of a Mature Security Team

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results