CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Ofer Maor
CTO and Co-Founder at Mitiga
Ofer Maor is a leading technology expert and entrepreneur with over twenty years of experience in information technology and security. In the past two decades, Ofer has helped successful security companies build and deliver technology innovation and products. His responsibilities ranged from hands-on technology research, development, networking, IT and (ethical) hacking, through product building, strategy, marketing and sales, and all the way to M&A of multiple companies. In his current position at Mitiga, Ofer is reshaping how organisations prepare for and deal with breaches, focusing on the new era of attacks across cloud, multi-cloud and hybrid-cloud environments.


Office 365 website on a computer screen showing potential security breach
Cyber SecurityInsights

5 Tips To Help You Prepare for a Potential Slack or Office 365 Breach

August 25, 2022
The shift to cloud-based collaboration platforms, the amount of sensitive data that is now stored and communicated on those platforms, and the level of trust that people put into communication on those platforms have an inevitable conclusion: we are going to see more attacks on those platforms.
Read More
Man in front of virtual screen showing cyber resilience against data breach
Cyber SecurityInsights

5 Ways Organizations Can Increase Readiness and Resilience To Avoid a Major Crisis When a Breach Occurs

July 26, 2022
Combining elements of information security, business continuity, and organizational resilience, a cyber resilience strategy can enable rapid recovery from an inevitable attack with little to no operational disruption.
Read More

Latest

View of a large coal-fired power plant showing critical infrastructure warning of ransomware attacks by CISA

New CISA Program to Warn Critical Infrastructure Companies of Vulnerabilities That Could Invite Ransomware Attacks

Hand inserting dollar bills in Bitcoin ATM showing crypto theft

Bitcoin ATMs Hacked, Millions in Crypto Stolen as Threat Actors Exploit an Upload Vulnerability

Webpage of ChatGPT showing chat histories exposed by ChatGPT bug

Titles of User Chat Histories Exposed by ChatGPT Bug

Chinese national flag on circuit board showing Chinese hackers cyber attacks

Chinese Hackers Targeting Outer Layers of Networks for Cyber Attacks, Using New Malware for “Multi-Year” Intrusions

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results