CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Blogs
All
  • Blogs
  • Cyber
  • Cyber Security
  • Data Privacy
  • Data Protection
  • Digital
  • Future of Privacy
  • General
  • Insights
  • News
  • Privacy Intelligence
  • Resources
  • Security Demystified
  • Sponsored
  • Tech
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Blogs

Blogs by industry experts

Image of lock and chain over keyboard signifying the need to protect the privacy of both home and business from ransomware
BlogsCyber SecurityPrivacy Intelligence

Protect Your Home and Business Privacy from Ransomware

February 23, 2018
Individuals, business leaders, and all other types of organization leaders need to improve their ransomware protections to protect their personal data, preserve privacy, and maintain access to their other data. What are some of the simple steps to avoid being a ransomware victim?
Read More
Image of speeding through a tunnel signifying the passage of time and what's changed and what hasn't in addressing privacy
BlogsData PrivacyPrivacy Intelligence

Twenty-Four Years Addressing Privacy: What’s Changed and What Hasn’t

February 1, 2018
While so much has changed in technology and addressing privacy, it is important to never forget the lessons of the past. The basic categories of privacy risks are still the same and the general concepts for mitigating those risks are also pretty much the same as they were decades ago.
Read More
Image of World Economic Forum (WEF) at a conference in Davos and the discussion of security and AI
BlogsCyber SecuritySecurity Demystified

WEF in Davos – Dominated by Security and AI – #Wow What a Long Way We Have Come!

February 2, 2018
Cybersecurity and AI has dominated the recently concluded WEF at Davos. Yet, there is still a lot more to be done in terms of close and constant cooperation between the pioneering private organizations and the forward thinking governments. Simple right? Easier said than done.
Read More
Girl looking at the stars with telescope beside her showing what to expect in 2019
BlogsCyber SecurityPrivacy Intelligence

What to Expect in 2019

January 25, 2019
One of my clients recently asked me what organizations should expect for information security and privacy in 2019. My short answer: More! Here is what to expect in five key areas in 2019, and beyond.
Read More
Image of man using finger to stop blocks falling like dominos signifying how contracted service providers can take down your business
BlogsData PrivacyPrivacy Intelligence

Will Your Contracted Service Providers’ Breaches Take Down Your Business?

April 13, 2018
[24]7 notified Sears, Best Buy, Delta, and other clients using their platform, about a data breach six months after the breach occurred. What should service providers and organizations that contract these third parties be doing better to protect their customers' privacy and personal data?
Read More
Image of man using his finger to select a person in a network showing how privacy might not be dead but may be difficult to get it back
BlogsData PrivacyFuture of Privacy

Your Privacy Might Not Be Dead, but How Can You Get It Back?

April 24, 2018
Corporations and governments have access to more of your personal information than ever. Just existing in the digital world leaves a footprint that can be used to track and market to you with, and more commonly, without your permission. But all is not lost in the fight for personal privacy.
Read More
Closeup portrait dumb looking clueless man arms out
BlogsData PrivacyPrivacy Intelligence

Your View of “Personal Information” is Probably Not Wide Enough

May 17, 2018
In the past few months the amount of talk, advice, debates, and claims about the EU GDPR which goes into effect May 25, has escalated to a fever pitch. And there is the rub. Most organizations do not know really know or understand what “personal data,” the GDPR term, is as it applies to their organization.
Read More
1 2

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results