CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Automobile production line showing OT devices vulnerabilities for industrial control systems
Cyber SecurityNews

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

June 27, 2022
Exploitable features are the favored means by which to penetrate OT devices, and the current research finds that they continue to be an issue in industrial control systems.
Read More
User typing password on screen showing portable digital identity
Cyber SecurityInsights

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

June 27, 2022
In a digitally-advanced modern world, replacing passwords seems like an uphill battle. But with the concept of portable digital identities, renowned brands are putting the foundation stone for a whole-new rich experience for users worldwide.
Read More
Developers typing on keyboards while writing code showing API security and cybersecurity incidents
Cyber SecurityNews

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

June 24, 2022
The lack of API security is responsible for every 1 in 13 cybersecurity incidents, with annual global losses of up to $75 billion and 57% affecting American businesses.
Read More
Robot toys gather around a laptop showing Russian botnet for proxy service
Cyber SecurityNews

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

June 24, 2022
International law enforcement has taken down illicit proxy service RSOCKS, a Russian botnet that has been active since at least 2014 and compromised millions of devices.
Read More
Team discussing cybersecurity strategy in front of laptops
Cyber SecurityInsights

Can Your Cybersecurity Strategy Stop a Determined Attacker?

June 24, 2022
If your current system isn’t capable of tracking and assessing different user variables online, chances are your business isn’t fully prepared to stop a determined attacker. What layers is your cybersecurity strategy missing?
Read More
Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

June 23, 2022
67% of businesses suffered subsequent cyber attacks within a year after the first incident, with 10% recording ten or more repeated breaches. Medium-sized firms were most impacted.
Read More
Iran flag on a black keyboard showing spear phishing for account takeover
Cyber SecurityNews

Iranian Spear Phishing Operation Targeting US and Israeli Government Figures, Email Account Takeovers Lead to Impersonation Campaigns

June 23, 2022
The Iran-backed campaign targets prominent Israelis and uses spear phishing to gain access to emails, leveraging the account takeover to hijack existing conversations.
Read More
Opened hand levitating virtual objects showing Web3
Cyber SecurityInsights

What Does Web3 Truly Look Like?

June 23, 2022
New, decentralized Web3 technologies stand to address virtually all concerns of the old internet, but there’s a catch. All too often these networks are still built upon legacy infrastructure, and, as such, are exposed to many of the same defects.
Read More
Metamask Web3 wallets on mobile phone screen showing Chinese hackers
Cyber SecurityNews

Web3 Wallets Targeted by Chinese Hackers; “SeaFlower” Using Cloned Websites to Trick Crypto Traders

June 22, 2022
The Chinese hackers are distributing backdoored Web3 wallets, primarily targeting searches for Coinbase Wallet, imToken, MetaMask and Token Pocket, and are focused on both iOS and Android users.
Read More
Bunch of rough shape keys showing user credentials sold on dark web
Cyber SecurityNews

Over 24 Billion Compromised User Credentials Circulating on the Dark Web Market

June 22, 2022
Digital Shadows Photon Research team found that over 24 billion stolen user credentials were available for sale on the dark web market in 2022, an increase of 65% in two years.
Read More
1 2 3 … 164

Latest

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results