CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
NHS logo with heart silhouette showing email accounts used for phishing campaign
Cyber SecurityNews

Legitimate NHS Email Accounts Exploited in Credential Harvesting Phishing Campaign and Advance-Fee Scams

Malware symbol showing Russian hackers phishing campaign

Phishing Campaign by Russian Hackers Uses Trello, Dropbox to Target Diplomats

IoT showing smart information and supply chains

Securing Entire Supply-Chains in Preparation for an IoT Future

Steel long pipes in crude oil factory during sunset showing Colonial Pipeline ransomware attack

Colonial Pipeline May Face $1 Million Penalty for “Operational” Lapses in 2021 Ransomware Attack

Man holding unlocked lock showing vulnerability management program

Keep Your Network Safe: Why Every Organization Needs a Vulnerability Management Program

Central Park in San Jose, Costa Rica showing national emergency due to Conti ransomware
Cyber SecurityNews

Conti Ransomware Declared a “National Emergency” in Costa Rica; $15 Million in Rewards Offered by US Government

Ferrari logo on on car showing NFT scam
Cyber SecurityNews

Ferrari Website Hacked, Used to Push NFT Scam That Built on Official Announcement

Smart glasses looking at city showing ransomware and insider risks
Cyber Security

Insider Risks, Ransomware and Nation-state Attacks Could Worsen the Risk Landscape in 2022

Data Privacy

Business people talking to each other showing data privacy jobs demand for privacy pros
Data PrivacyNews

Data Privacy Jobs Report Shows Demand for Privacy Pros at Record High Thanks to Complex Regulatory Requirements, Mass Migration to Cloud Services

People network and global communication showing location data sold to ad networks

Grindr Location Data Sold to Ad Networks From 2017 to 2020, Legacy Information May Still Be Available

Digital city with connection network showing internet freedom

“Declaration for the Future of the Internet” Addresses Internet Freedom Amidst Decade-long Global Decline in Free Speech and Accessibility

Man working on a code on dark digital background showing FISA warrantless searches and surveillance

FBI Warrantless Searches More Than Doubled in 2021, With 3.4 Million FISA Requests; Agency Claims Unusual Surge in Cyber Attacks on Critical Infrastructure

Google Play store application icon on mobile phone screen showing privacy labels for Android apps

New Apple-Like Privacy Labels Come to Google Play’s Android Apps

Many small network connected to a larger network showing federated learning and privacy enhancing technologies

What Privacy Professionals Need To Know Before Investing in Federated Learning

Apple store in Thailand showing impact of Apple privacy update for 2022

New Study of Apple Privacy Update Finds Costs To Impacted Companies Expected To Increase, Could Hit $16 Billion in 2022

Data Protection

European flag with circuit board showing Digital Services Act on targeted advertising and recommender algorithms
Data ProtectionNews

Finalized EU Digital Services Act Promises Transparency in Recommender Algorithms, New Restrictions on Targeted Advertising

Facebook logo seen in the background of a silhouette woman holding a mobile phone showing leaked documents shows issue with user data and privacy regulations

Leaked Documents From Facebook Indicate Engineers Have Lost Control of User Data, Can’t Keep Up With International Privacy Regulations

Danske bank logo on front of branch showing GDPR violations

Danske Bank Fined for GDPR Violations, Customer Data Held for Longer Than Legally Allowed

Utah State Capitol Building in Salt Lake City showing business-friendly privacy act

“Business-friendly” Utah Privacy Act Set To Go Online in 2024

Judge gavel on American flag on wooden table showing privacy laws

Countdown to New Privacy Laws: How Businesses Should Prepare

Hands holding padlock with CCPA logo showing data subject requests

CCPA Data Privacy Trends Report: Data Subject Requests Indicate California Consumers Are Quick To Assert Their Privacy Rights

Hands holding virtual people icons showing cybersecurity and privacy of customer data

How Can You Control What You Cannot See? Managing Control Over Customer Data

Cyber Security

Close-up NPM package showing malware
Cyber SecurityNews

Bug Allows Malware Authors To Add Reputable Contributors To Malicious NPM Packages Without Their Knowledge or Consent

Logo of Twitter on smartphone screen with dollar bills and Elon Musk showing plan to open source Twitter's algorithm

Elon Musk Plans To Take Twitter’s Algorithm Open Source; Could It Create Security Issues?

US Defense Department Petagon seen from above showing phishing scam on DoD contractors

Phishing Scam Nets $23.5 Million From DoD, California Man Arrested Siphoning Money From Contractors

Team of employees celebrating showing cybersecurity teams and culture

Make Cybersecurity a Way of Life at Your Organization

Hacker stealing emails showing cyber espionage for M&A

Corporate M&A Under Attack by Cyber Espionage Gang That Enters via Unsecured IoT Devices, Quietly Monitors Emails

Microphones from news agencies at a press conference showing responsible disclosure for data breach

Full Disclosure Is the Right Thing To Do. Full Stop.

Woman CEO talking on video conference call

Report finds only 3% of Cybersecurity Startups That Raised Venture Funding in 2020 and 2021 are Led by Female CEOs

Get Connected

Recent Posts

NHS logo with heart silhouette showing email accounts used for phishing campaign

Legitimate NHS Email Accounts Exploited in Credential Harvesting Phishing Campaign and Advance-Fee Scams

Malware symbol showing Russian hackers phishing campaign

Phishing Campaign by Russian Hackers Uses Trello, Dropbox to Target Diplomats

IoT showing smart information and supply chains

Securing Entire Supply-Chains in Preparation for an IoT Future

Steel long pipes in crude oil factory during sunset showing Colonial Pipeline ransomware attack

Colonial Pipeline May Face $1 Million Penalty for “Operational” Lapses in 2021 Ransomware Attack

Man holding unlocked lock showing vulnerability management program

Keep Your Network Safe: Why Every Organization Needs a Vulnerability Management Program

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results