CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hackers breaking into election systems using VPN vulnerability and Zerologon bug according to FBI CISA alert
Cyber SecurityNews

Joint FBI and CISA Alert Warns of Hackers Exploiting VPN Vulnerability and Zerologon Bug To Compromise Election Systems

October 23, 2020
A joint FBI and CISA alert warned that hackers were exploiting Fortinet’s VPN vulnerability and the Microsoft Zerologon bug to compromise government networks hosting election systems.
Read More
Hacker using malicious code showing effect of Ripple20 and need for Zero Trust
Cyber SecurityInsights

How to Combat the Crippling Effect of Ripple20

October 22, 2020
Since patching is problematic and traditional perimeter security is ineffective for Ripple20 vulnerabilities, Zero Trust security may be the right answer.
Read More
Open padlock on the computer keyboard showing Microsoft and Cyber Command takedown of TrickBot botnet
Cyber SecurityNews

US Cyber Command Teams With Microsoft To Limit TrickBot Botnet Ahead of Expected Election Interference

October 21, 2020
The US Cyber Command is expecting the TrickBot botnet to be involved in election interference attempts, and is actively running persistent operations against it along with Microsoft.
Read More
Two surgeons looking at screen showing need to amend HITECT Act for healthcare sector
Cyber SecurityInsights

The Pandemic Affecting the Healthcare Sector – A Call for Amending the HITECH Act

October 21, 2020
With specific guidance from an amended HITECH Act to include a comprehensive cyber policy, the healthcare industry will better secure patients’ data.
Read More
Hacker hand stealing data from laptop showing Barnes & Noble data breach
Cyber SecurityNews

Barnes & Noble Alerted Customers of Data Breach That Leaked Personal and Transaction Information

October 20, 2020
Barnes & Noble was hit by a suspected ransomware attack that prevented customers from accessing their libraries and exposed their personal information, including email addresses and transaction history.
Read More
Close up of businessman typing on laptop showing insider threats
Cyber SecurityInsights

Insider Threats Continue to Plague Enterprise Security Teams

October 20, 2020
Two-thirds of breaches are inside jobs. Yet, insider threat programs account for less than 10% of the budget. Are enterprise cybersecurity efforts properly prioritized?
Read More
Businessman holding shield protect icon showing adoption of Zero Trust security model
Cyber SecurityNews

COVID-19 Pushed Most Firms To Adopt Zero Trust Security Model, a New Study Found

October 19, 2020
COVID-19 pushed more firms towards Zero Trust security model to protect corporate networks from cyber threats. About 82% said they were committed to making the transformation.
Read More
Hacker stealing data using laptop showing stolen credit cards from Dickey's BBQ data breach sold on Joker's Stash dark web marketplace
Cyber SecurityNews

Three Million Credit Cards Harvested and Sold on Joker’s Stash; Dickey’s BBQ Hack Undetected for Over a Year

October 19, 2020
About 3 million credit card numbers were siphoned off and sold at Joker's Stash. Dickey's appears to have become aware of the data breach after at least a year of activity.
Read More
Red binary code background with open black padlock icon showing Clop ransomware attack
Cyber SecurityNews

Clop Ransomware Attack Hits German Software Giant Software AG; Confidential Documents Stolen, $23 Million Ransom Demanded

October 19, 2020
Software AG, Germany's second-largest software vendor, fell victim to a Clop ransomware attack that compromised company files and employee information.
Read More
Stethoscope on laptop showing ransomware attack impacting clinical trials
Cyber SecurityNews

Ransomware Attack on a Major Health Tech Firm Slows Down Several COVID-19 Clinical Trials

October 16, 2020
A ransomware attack on eResearch Technology, the firm behind three-quarters of FDA drug approvals, slowed down clinical trials for several research facilities.
Read More
1 … 130 131 132 133 134 … 208

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results