CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

ChatGPT logo on smartphone screen showing security risks of AI/ML solutions
Cyber SecurityInsights

The Risks of Using ChatGPT-Like Services

May 29, 2023
The focus is now turning to the cybersecurity implications of ChatGPT and other AI/machine learning (ML) platforms especially after the recent OpenAI security incident. What are some of the key security considerations that organizations need to consider before they explore how to utilize new AI/ML solutions?
Read More
Man using laptop computer with virtual documents showing ransomware gangs shift to data extortion attacks
Cyber SecurityNews

BianLian Ransomware Gang Shifts to Purely Data Extortion Attacks, Warns Joint Advisory

May 26, 2023
Authorities in the U.S. and Australia have warned that the BianLian ransomware gang has abandoned the double extortion model for purely data extortion attacks. More groups are likely to follow suit and forego the hassle of developing and managing the encryption and decryption process in favor of a less complicated attack,
Read More
Woman with Umbrella walking on street at night showing cyber insurance and ransomware attacks
Cyber SecurityInsights

Cyber Insurance Cannot Offset the Dangers of Ransomware

May 26, 2023
Cyber insurance only forms part of the puzzle in bolstering cyber resilience. Even with cyber insurance, businesses must not consider themselves immune from ransomware attacks. They must still implement cyber hygiene practices as part of a holistic data protection and recovery strategy.
Read More
Bitcoins on laptop displaying ransom message showing ransomware payout
Cyber SecurityNews

Group-IB: Qilin Affiliates Receive Up to 85% Of Each Ransomware Payout

May 25, 2023
Group-IB researchers infiltrated the Qilin ransomware operation and observed that the group's payment structure rewards affiliates with 80% from a ransomware payout of $3 million or less and 85% for any payout exceeding $3 million.
Read More
Finger touching virtual lock
Cyber SecuritySponsored

The Future of Identity Governance and Cyber Insurance

May 25, 2023
IGA is critical to ensuring security and compliance because it gives visibility into who has access to what guarantees that access privileges are issued in accordance with preset regulations, and allows for rapid response to access-related security issues.
Read More
Man with mobile phone and virtual lock
Cyber SecuritySponsored

Is Single Sign On (SSO) The Same as Saml (Security Assertion Markup Language)?

May 25, 2023
Single Sign-On (SSO) and Security Assertion Markup Language (SAML) are both crucial elements in the world of identity and access management (IAM), but they are not the same thing. They are, however, closely related and often used together to provide secure, streamlined access to multiple applications.
Read More
Man using smartphone with login virtual interfaces
Cyber SecuritySponsored

Cybersecurity Authentication From a Customer Perspective

May 25, 2023
Nowadays, a lot of businesses are using passwordless authentication techniques. These can include SMS codes, which send a one-time code to the customer's phone, email magic links, which send a one-time link to the customer's email address, and social login, which allows users to log in using their Facebook or Google credentials.
Read More
Digital lock against global technologies
Cyber SecuritySponsored

Why Is Active Directory Management So Important?

May 25, 2023
Active Directory administration is critical in protecting organizations from cyber threats. Organizations can ensure that users only have access to the data and systems required to perform their job duties by managing access rights.
Read More
Businessman sign in on smart phone
Cyber SecuritySponsored

Which Multifactor Authentication Method Should Your Organization Use?

May 25, 2023
Implementing MFA methods improves an organization's security posture by lowering the likelihood of identity theft, as a hacker would require more than just the user's password to obtain access to their account.
Read More
Business woman hand using computer with padlock security
Cyber SecuritySponsored

What Is the Difference Between Authentication and Authorization?

May 25, 2023
Although they are closely related, authentication and authorization are two essential elements of identity security that perform different functions. Authentication and permission are crucial in the context of identity security.
Read More
1 2 3 … 218

Latest

ChatGPT logo on smartphone screen showing security risks of AI/ML solutions

The Risks of Using ChatGPT-Like Services

Man using laptop computer with virtual documents showing ransomware gangs shift to data extortion attacks

BianLian Ransomware Gang Shifts to Purely Data Extortion Attacks, Warns Joint Advisory

Hands holding a mobile phone showing Google location tracking lawsuit

Google Settles Washington Location Tracking Lawsuit for $39.9 Million

Woman with Umbrella walking on street at night showing cyber insurance and ransomware attacks

Cyber Insurance Cannot Offset the Dangers of Ransomware

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results