CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Woman using laptop with malware icon showing the massive ransomware attack which hit 22 cities and towns in Texas
Cyber SecurityNews

Massive Ransomware Attack in Texas Hits 22 Cities and Towns, Hackers Demand Millions in Payment

September 2, 2019
Agencies of nearly two dozen small cities and towns in Texas were hit with a ransomware attack that crippled key city services like payment processing operations and printing of identity documents.
Read More
Woman with high tech smart glasses showing how movies can help you understand data privacy and hacking
Cyber SecurityInsights

Movies That Can Help You Understand Data Privacy and Hacking

August 29, 2019
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Read More
Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
Read More
Man pressing at fingerprint scanner on virtual screen showing the data breach of biometrics database which exposed 28 million records of facial recognition and fingerprint data
Cyber SecurityNews

Breach of Biometrics Database Exposes 28 Million Records Containing Fingerprint and Facial Recognition Data

August 27, 2019
A recent breach of biometrics giant Suprema has exposed 28 million records of facial recognition and fingerprint data including unencrypted username-password combinations stored in plain text.
Read More
Picture of an opened door showing election systems in 10 U.S. states found to be connected to Internet
Cyber SecurityNews

Internet-Connected Election Systems Found in 10 U.S. States

August 22, 2019
ESS, largest voting systems company in U.S with at least 260,000 machines in 21 states, was found to have 35 election systems in 10 states connected to the internet when they were not supposed to be.
Read More
Wall-shaped binary codes showing the impact of artificial intelligence on cyber security
Cyber SecurityInsights

The Impact of Artificial Intelligence on Cyber Security

August 22, 2019
It’s no debate that artificial intelligence has both positive and negative impacts when used to defend against cyber attacks. One way to deal with it is to combine traditional techniques with AI tools when developing a cyber security strategy.
Read More
Hacker working on computer showing how North Korea is funding its WMD program with cybercrime
Cyber SecurityNews

North Korea Funding Its WMD Program With Cybercrime

August 20, 2019
New UN report discloses how North Korea has financed its WMD program with more than $2 billion from cybercrime against world’s largest financial institutions and cryptocurrency exchanges.
Read More
Hexagonal grid and padlocks showing the unknown extent of damage for State Farm’s credential stuffing attack
Cyber SecurityNews

Extent of Damage for State Farm Credential Stuffing Attack Still in Question

August 19, 2019
State Farm, the insurance giant with more than 83 million customers, was hit by a credential stuffing attack with unknown number of customer accounts compromised.
Read More
Trainees feeling bored in office training showing the common problems and limitations of cyber security awareness training
Cyber SecurityInsights

Common Problems and Limitations Of Cyber Security Awareness Training

August 16, 2019
With people being the weakest links in cyber attacks, why are companies not focusing on cyber security awareness training for their employees or making them more effective?
Read More
Hacker working on laptop showing the aftermath questions over Capital One data breach
Cyber SecurityInsights

What Happens Next After the Massive Capital One Data Breach

August 15, 2019
The massive Capital One data breach has triggered many to question the benefits of buying cyber insurance, the risks in storing data in the cloud and what consumers should do when faced with a breach.
Read More
1 … 127 128 129 130 131 … 158

Latest

Happy woman shopping showing credit card data stolen from online checkout using PHP code

FBI: Hackers Injected Malicious PHP Code Into Online Checkout Pages to Scrape Credit Card Data

Hand touching screen of smartphone showing cyber defense

5 Ways Enterprises Can Protect Their Data, Time, Money, and Infrastructure

New Data Shows Compliance Falls Short of Protecting Your Organization

A army of green robots showing bad bot traffic

Bad Bot Traffic Report: Almost Half of All 2021 Internet Traffic Was Not Human

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results