CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Sponsored by Specops
Specops Software is a leading password management and authentication solution vendor. We protect business data by blocking weak passwords and securing user authentication. Our solutions are natively integrated with Active Directory, ensuring all sensitive data is stored on-premises.


Analyst working with computer
Cyber Security

Using Automation to Fight the Cybersecurity Skills Gap

March 30, 2023
With evolving threats and cybercrimes, things will undoubtedly get worse before they get better. This is leaving many cybersecurity professionals to consider new and innovative ways of improving productivity, reducing burnout, and combatting the cybersecurity skills gap.
Read More
Cyber Security

Transparent Password Strength Helps End-Users Improve Cybersecurity

February 23, 2023
More cyber-attackers are employing some level of credential theft over other types of cyber threats. Recent data proves that credential protection, especially passwords, are essential to data security.
Read More
Man using laptop computer and holding cyber security lock icons
Cyber Security

We’re a Long Way From a Passwordless Reality

January 5, 2023
For better or worse, passwords aren’t going away anytime soon. As long as passwords are active, criminal hackers will use them to access organizations. Organizations need solid password policies to safeguard Active Directory against breached passwords to prevent hacker access.
Read More
Woman typing on keyboard with password screen
Cyber Security

Reduce the Risk of Cyber-Attack in 2023 by Blocking Known Breached Passwords

December 28, 2022
Password-based authentication is both the first line of defense, and the weakest link, when it comes to securing your SaaS applications. We know that end-users default to poor password practices—recent reports found 99% of users reusing passwords either across work accounts, or between work and personal accounts.
Read More
Man using phone and laptop with virtual login screen
Cyber Security

Protect Your Ad From Holiday Hackers With Better Password Hygiene

December 7, 2022
Criminal hackers look eagerly toward the holidays because it's a time for vacations, general absences, and fewer eyes on the organization's passwords. There is a 30% increase in the average number of ransomware attacks over the holiday period compared to the monthly average.
Read More
Red binary code background with open padlock showing breached credentials and ransomware
Cyber Security

Breached Credentials Remain the Key Entry Point Behind Rising Ransomware Attacks

October 25, 2022
According to iapp, almost half of all data breaches in 2022 began with stolen credentials and ransomware damages are expected to exceed $30 billion worldwide in 2023.
Read More
Man in front of laptop and holding mobile phone with lock symbol showing MFA
Cyber Security

Targeted Phishing Attacks That Overtook MFA – Setting up a Better Security Defense

October 12, 2022
Attackers used SMS text messages as a delivery mechanism is the Twilio and Cloudflare attack. Additionally, the attackers seemed to have targeted specific employees and they demonstrated significant knowledge of who those employees regularly interacted with.
Read More
Cyber Security

New Data Shows Compliance Falls Short of Protecting Your Organization

May 26, 2022
New report showing individual compliance regulations and their propensity to allow breached passwords into the fold – up to 83% of known breached passwords can satisfy regulatory compliance standards.
Read More
Employee wearing face mask feeling tired looking at laptop screen showing pandemic burnout
Cyber Security

Why Pandemic Burnout Is a Cybersecurity Problem and How To Fix It

April 27, 2022
There is more to pandemic burnout than just wanting the world to go back to the way that it used to be. Pandemic burnout is directly contributing to a variety of cybersecurity problems.
Read More

Latest

Man using laptop computer with virtual documents showing ransomware gangs shift to data extortion attacks

BianLian Ransomware Gang Shifts to Purely Data Extortion Attacks, Warns Joint Advisory

Hands holding a mobile phone showing Google location tracking lawsuit

Google Settles Washington Location Tracking Lawsuit for $39.9 Million

Woman with Umbrella walking on street at night showing cyber insurance and ransomware attacks

Cyber Insurance Cannot Offset the Dangers of Ransomware

Bitcoins on laptop displaying ransom message showing ransomware payout

Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results