CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Padlock on computer keyboard showing Kazakhstan government intercepting citizens’ web traffic as part of Internet surveillance
Cyber SecurityNews

Kazakhstan Internet Surveillance Plan Involves Intercepting Citizens’ Web Traffic

August 1, 2019
All citizens in Kazakhstan are forced to install a government-issued national security certificate as part of Internet surveillance strategy. This certificate will allow government to read all their messages or even alter them.
Read More
Man forecasting a crystal ball showing the possible data breach settlement that companies could face with the record-setting FTC fine on Equifax
Cyber SecurityNews

Equifax $700 Million Data Breach Settlement a Sign of Things to Come

July 31, 2019
Record-setting FTC fine of $700 million on Equifax data breach settlement is a warning of things to come as federal agencies step up protection of consumer data and personal information.
Read More
Hacker standing among city crowd showing massive data breach at Bulgaria national tax agency which exposed five million citizens’ information
Cyber SecurityNews

Massive Data Breach in Bulgaria Compromises the Country’s Entire Adult Population

July 30, 2019
Tax information of five million Bulgarians were exposed in a massive data breach at country's national tax agency. Not only do the government need to worry about the leaked data, they are also subjected to GDPR penalties.
Read More
Man using mobile on the street showing potential impact of Sprint data breach on T-Mobile merger
Cyber SecurityNews

Sprint Data Breach Exposes Customers to Unknown Attackers; Will This Impact the T-Mobile Merger?

July 25, 2019
Sprint claims recent data breach will not cause risk to fraud or identify theft but the compromised customer information could lead to SIM swap attacks and allow attackers to take over victim’s accounts.
Read More
Hand stealing a purse through a laptop showing new cyber attack trends report revealed a $45 billion cyber crime industry in 2018
Cyber SecurityNews

New Cyber Attack Trends Report Reveals That Digital Criminals Made Off With $45 Billion in 2018

July 22, 2019
Recent Cyber Incident & Breach Trends report not only reveals a $45 billion cyber crime industry in 2018, it also suggests a shift in cyber attack trends towards focused attacks on businesses.
Read More
Huawei company logo showing addressing cyber threats should be a bigger concern than Huawei being a vendor in 5G
Cyber SecurityInsights

Is Huawei or the Exploding Cyber threat the Biggest Concern for 5G?

July 19, 2019
Exclusion of Huawei from U.S. market is a distraction from addressing cyber threats in 5G networks where much greater number of connected devices could be subjected to attacks.
Read More
Hand on audio mixing board showing the rising use of deepfake audio to run AI cyber attacks
Cyber SecurityInsights

The Cutting Edge of AI Cyber Attacks: Deepfake Audio Used to Impersonate Senior Executives

July 18, 2019
Deepfake audio is becoming the powerful new tool to perform AI cyber attacks by impersonating executives to convince employees to authorize money transfers.
Read More
Dead cockroach on table showing the need to design right crowdsourced security testing model for bug bounties
Cyber SecurityInsights

The Romance of Bug Bounties

July 16, 2019
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns.
Read More
Businessman looking at tablet through magnifying glass showing the role of investor in boosting global cyber security as outlined in new WEF report
Cyber SecurityNews

New WEF Report Outlines Role of the Investor in Boosting Global Cybersecurity

July 12, 2019
Investors can no longer ignore the cyber resilience of their target companies, in fact the new WEF report shows they should be actively play a role in incentivizing responsible and secure innovation.
Read More
Woman typing on keyboard with application icons around showing Chinese Cloud Hopper operation which targets tech providers for access to their customers’ intellectual property
Cyber SecurityInsights

Chinese Cloud Hopper Operation Targets Top Tech Providers in World

July 11, 2019
It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.
Read More
1 … 129 130 131 132 133 … 158

Latest

Swiss National Bank and Parliament illuminated at night showing Swiss banking secrecy

Swiss Government Proposes Backdoor in Its Banking Secrecy Laws for Spy Agency; Pressure Applied by UN Over Human Rights Concerns

Young man looking at laptop computer in the dark showing Great Resignation increased risks of intellectual property theft

How To Protect Company IP During the Great Resignation

Market price display at street in the night showing RTB adtech exposing online behavior data

Report on RTB: Adtech “Biggest Data Breach Ever Recorded,” Online Behavior More Exposed in Countries Without Privacy Regulations

Security researchers working together in front of computer monitors showing DOJ rules on CFAA

DOJ Rules “Good Faith” Security Researchers Will No Longer Be Prosecuted Under CFAA

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results