CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Katie Santos
Content Writer at Panda Security
When Katie isn't writing at her desk, she enjoys traveling the world or curling up to a great book.


Hands holding glasses in front of computer screen to adopt a hacker's point of view
Cyber SecurityResources

Adopting a Hacker’s Point of View

October 31, 2018
Just like detectives look into the mind of a criminal to solve the case, you can look into the mind of a hacker to guard your company’s online data. Hackers adapts quickly to new environments and enjoys a challenge. What are insights to be gleaned from their endeavors.? Read More

Latest

Abstract code background showing supply chain attack on Git server

PHP Team Averted a Supply Chain Attack After Hackers Compromised Their Self-Hosted Git Server and Inserted a Backdoor

Google Ads logo on smartphone screen showing national security concern over ad auctions of ad exchanges

US Senate Scrutinizing Ad Exchanges Over Foreign Ad Auctions

Young Caucasian man make notes working on laptop participating in security awareness campaign

4 Critical Elements of Effective Security Awareness Campaigns

Close-up view of Booking.com logo on its website showing fine due to late data breach notification

Hefty Fine for Booking.com Due to Delayed Data Breach Notification; With Little Financial Information Stolen, Is the Amount Excessive?

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results