CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker working on laptop showing Russian hackers shifting focus to BEC scams
Cyber SecurityNews

Russian Hackers Shifting Focus to BEC Scams; One Prominent Group Has Hit 200 Businesses in the Past Year

July 24, 2020
Russian hackers appear to have shifted their cybercrime focus to BEC scams as new study shows that they have struck over 200 businesses in 46 countries since July 2019.
Read More
Doctor working with digital tablet and phone showing MDM and HIPAA
Cyber SecurityInsights

How MDM Can Be Pivotal To Maintain Data Security for HIPAA

October 7, 2022
To ensure that the patient information being generated, stored and exchanged is secure, healthcare organizations are rapidly implementing mobile device management (MDM solutions) to push extensive security policies and tailor the usage of their diverse types of devices to ensure that the data stored on them is secured efficiently.
Read More
Virtual key on digital background showing GenAI and security and privacy
Cyber SecurityInsights

Safeguarding Data in the Age of GenAI: Innovations in Security and Privacy

April 17, 2024
Generative AI (GenAI) has prompted fears about data security and privacy, but it may also be the tool that organizations have been looking for to improve security and privacy through better data handling.
Read More
Broken lock on a computer keyboard showing data leak of VPN credentials
Cyber SecurityNews

Data Leak Exposes 50,000 Fortinet VPN Credentials on Popular Underground Hacker Forums and Chats

December 4, 2020
Hackers published a list of 50,000 Fortinet VPN credentials stolen from vulnerable devices. A second data leak dumped sslvpn_websession files for every IP initially compromised.
Read More
Cybersecurity Threats and Attacks That Target Authentication Mechanisms
Cyber SecuritySponsored

Cybersecurity Threats and Attacks That Target Authentication Mechanisms

February 10, 2025
Cybersecurity threats targeting authentication mechanisms have grown increasingly sophisticated, posing serious risks to organizations and individuals alike.
Read More
Virtual lock over laptop showing zero trust and IAM
Cyber SecurityInsights

Why Authorization Is Rising as a Priority in IAM

January 3, 2023
Identity-first security which focuses on the integrity of the user identity as the core of an organization's security strategy is now a prerequisite for Zero Trust architecture, and is designed to ensure that the individual is authorized throughout the user's digital journey and granted the right level of access to the appropriate digital assets.
Read More
Developer working on sofa showing software supply chain attacks on open source
Cyber SecurityInsights

Sophisticated Attackers Are Increasing in the Software Supply Chain

October 25, 2023
The software supply chain is becoming the new battleground. Trust, once a cornerstone of open-source, is now under scrutiny. Developers need to exercise caution, vetting each package, no matter how reputable the source might seem.
Read More
Graphic interface with money flow showing wire fraud
Cyber SecurityInsights

Preventing Wire Fraud Can Be Easy, Navigating Liability Is Much More Complicated

December 23, 2021
Given the growth of wire fraud and grey area when it comes to liability, creating a system that guarantees protection has become incredibly important. The best way to prevent uncertainty about who is at fault is to prevent the risk from happening all together.
Read More
Padlock against hands on keyboard showing tips for businesses to prevent data breach
Cyber SecurityInsights

How to Prevent Your Data from Breaching – Tips for Businesses

May 22, 2019
Protecting your client’s private information is crucial for a business, learn more about security measures to prevent data breach and guarantee safety of information in the online world.
Read More
Lock on red background showing ransomware attacks on healthcare organizations
Cyber SecurityNews

FBI, CISA, and HHS Warn Healthcare Organizations of Targeted ALPHV/BlackCat Ransomware Attacks

March 8, 2024
A joint cybersecurity advisory by federal agencies warns healthcare organizations of targeted ALPHV/BlackCat ransomware attacks in retaliation against the FBI’s botched seizure.
Read More
1 2 3 … 317
- Advertisement -
- Advertisement -

Latest

Open padlock showing canvas hack

Canvas Hack Leaks 3.65 TB from Over 8,000 Learning Institutions and Disrupts Learning Activities

AI tools on virtual screen showing shadow AI

Shadow AI Is Already Inside Your Network. Here’s How to Catch It.

Digital lock showing security flaw in Chrome extension

Security Flaw in Claude AI Chrome Extension Enables Attackers to Execute Privileged Commands and Steal Data

Motion blur of train moving inside tunnel showing security breach of high-speed rail

Taiwanese Student Halts High-Speed Rail Trains Using Software-Defined Radio Equipment

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Digital
Insights
News
Resources
Press Releases

© 2025 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Cyber Attack Regulations Ransomware Attack
    See all results