CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Cyber attack on smartphone showing Android spyware for surveillance
Data PrivacyNews

Android Spyware Discovered in Kazakhstan in Wake of Protests Against National Government

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops
Cyber SecurityInsights

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

Iran flag on a black keyboard showing spear phishing for account takeover
Cyber SecurityNews

Iranian Spear Phishing Operation Targeting US and Israeli Government Figures, Email Account Takeovers Lead to Impersonation Campaigns

Data Privacy

Apple store glass building in Munich. Germany showing antitrust probe on app tracking
Data PrivacyNews

Apple’s “App Tracking Transparency” Privacy Framework Faces New Antitrust Probe in Germany

Qutub Minar Tower in New Delhi India showing VPN providers pull out

VPN Providers Pull Servers Out of India Ahead of Cybersecurity Rule Change

Business people sitting around meeting table and assembling wooden jigsaw puzzle fitting privacy in risk and compliance

How Privacy Fits Into the Ever More Quickly Evolving Risk and Compliance Arena

Compliance-First vs Privacy-First: Why Aiming for Compliance Is a Failing Strategy

Face of an unrecognizable man with polygons on it showing face search engine

PimEyes Face Search Engine Alarmingly Thorough and Accurate, Able To Pick Faces Out of Crowds

Google Chrome application icon on mobile phone showing DuckDuckGo Chrome Extension blocks ad targeting

DuckDuckGo Escalates Showdown With Google; Chrome Extension Now Blocks Google Topics and FLEDGE Ad Targeting System

DuckDuckGo website close up showing privacy and transparency

Privacy for the Public

Data Protection

People walking on road in China showing PIPL
Data ProtectionInsights

Key Questions Answered for China’s Personal Information Protection Law

Judge hammer and gravel on US flag showing federal privacy law

Is a US Federal Privacy Law Finally on the Way? Proposed “American Data Privacy and Protection Act” Authored, Backed by Bipartisan Coalition

Privacy protect icon over hand of businessman showing privacy compliance for digital advertising

IAB Tech Lab Privacy Compliance Platform Seeks To Centralize EU & US Controls for Digital Advertising

Waving flags in front of European Parliament building showing Digital Markets Act

EU Digital Markets Act: Key Aspects and Lingering Questions

Aerial view of Gran Via, main shopping street in Madrid, Spain showing Google GDPR Fine for violating right to be forgotten

Spain Hands Google €10 Million GDPR Fine for Violation of “Right To Be Forgotten” Rules

USA map on digital display showing privacy regulations

Data Privacy Conundrum: When Different States Play by Different Rules. . .

London Big Ben and Westminster Bridge showing Queen's Speech Data Reform Bill and data adequacy issue

UK Data Reform Bill Announced in Queen’s Speech, Could Jeopardize Existing Data Adequacy Decision

Cyber Security

Opened hand levitating virtual objects showing Web3
Cyber SecurityInsights

What Does Web3 Truly Look Like?

Metamask Web3 wallets on mobile phone screen showing Chinese hackers

Web3 Wallets Targeted by Chinese Hackers; “SeaFlower” Using Cloned Websites to Trick Crypto Traders

Bunch of rough shape keys showing user credentials sold on dark web

Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market

Developers working together showing DevSecOps and threat modeling

A Case for Modernizing Threat Modeling in 2022

View of Microsoft office showing vulnerability disclosure

Tenable CEO: Microsoft Vulnerability Disclosure and Patching Practices Are Insufficiently Transparent, Put Customers at Risk

Notifications about many unread messages on Facebook Messenger on a smartphone showing phishing campaign on Facebook credentials

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign

Group of Chinese hackers in front of China flag showing cyber espionage in APAC

Previously Undiscovered Team of State-Sponsored Chinese Hackers, Has Been Quietly Committing Cyber Espionage in the APAC Region for a Decade

Get Connected

Recent Posts

Cyber attack on smartphone showing Android spyware for surveillance

Android Spyware Discovered in Kazakhstan in Wake of Protests Against National Government

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results