CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man typing on keyboard laptop showing ID verification and digital identity
Cyber SecurityNews

80% Of Consumers Prefer Brands With Robust ID Verification Measures, a Global Digital Identity Survey Found

June 3, 2022
8 of 10 consumers prefer transacting with online brands having strong ID verification measures with 68% preferring digital identity use in the financial services sector.
Read More
Man holding smartphone. using laptop and tablet showing zero trust architecture
Cyber SecurityInsights

5 Critical Considerations in Building a Zero Trust Architecture

June 3, 2022
Implementing a Zero Trust architecture will help mitigate and ultimately lower the number of successful cybersecurity attacks your organization might otherwise endure, greatly reducing operational and financial risk. Here are five practical steps.
Read More
Facial recognition data from technology scanning and detecting people's faces
Cyber SecurityNews

Clearview AI Draws Another Fine; UK ICO Assesses £7.5 Million for Scraping of Facial Recognition Data

June 2, 2022
Clearview AI will be fined £7,552,800, and has been ordered to stop collecting facial recognition data in the UK and to delete all of the data it had previously collected.
Read More
Hand holding a smart phone with new General Motors logo on screen showing credential stuffing attack
Cyber SecurityNews

Hackers Accessed Car Owners’ Personal Information in General Motors Credential Stuffing Attack

June 2, 2022
Threat actors compromised American automaker General Motors in a credential stuffing attack, accessed customers' personal information, and redeemed reward points for gift cards.
Read More
Hacker hand stealing data from laptop showing Conti ransomware
Cyber SecurityInsights

Conti Ransomware Group: The Alliances Behind the Chaos

June 2, 2022
Conti ransomware group has transformed from lone wolves into a globe-spanning pack of well-organized criminals disrupting and casting into disarray government entities, private organizations, and small and medium-sized businesses.
Read More
Man using phone and laptop with lock and keypad for authentication and password management
Cyber SecurityInsights

3 Authentication Strategies Organizations Need for Cybersecurity Today: Enterprise Password Management and Beyond

June 2, 2022
While organizations should prepare for a passwordless authentication-based future, in the interim, companies need to implement a strategy that utilizes as few passwords as possible, including products such as a password manager for business, federation, and privileged access management (PAM).
Read More
A Boeing 737-800 airplane of SpiceJet taking off showing ransomware attack disruption of flights operations
Cyber SecurityNews

Ransomware Attack Disrupted SpiceJet’s Flight Operations Leaving Passengers Stranded

June 1, 2022
An attempted ransomware attack on SpiceJet systems disrupted flight operations leaving passengers frustrated and stranded for hours with flights canceled in some locations.
Read More
Danger sign on screen showing Conti ransomware becoming smaller ransomware groups
Cyber SecurityNews

Conti Ransomware Group Voluntarily Shuttered, but Members Expected to Splinter off To Smaller Groups

June 1, 2022
Security researcher claims that the Conti ransomware attack on Costa Rica was an intentional smokescreen to cover a reorganization into smaller ransomware groups.
Read More
Close up of hand pointing at tablet with abstract cloud hologram showing SaaS security
Cyber SecurityInsights

The “Ghost SaaS” Threat and Why Security Teams Should Take It Seriously

June 1, 2022
Security teams need to be vigilant - both on what SaaS services employees are connecting to, and whether those platforms are safe and remains safe for use in the organization.
Read More
Woman using fingerprint for data access showing biometrics
Cyber SecurityInsights

Can Behavioral Biometrics Change the Future of Cybersecurity?

May 31, 2022
Depending on the use case and security scenario, users can be authenticated by combining different approaches like standard or behavioral biometrics. System can automatically and passively recognize who we are making it smooth, fast, and straightforward for the user.
Read More
1 … 131 132 133 134 135 … 292
- Advertisement -
- Advertisement -

Latest

Globe and data showing content scraping of AI bots

Cloudflare Announces New Content Scraping Protection Feature; “Easy Button” Stops AI Bots With a Click

Plane with NATO logo showing ICC cyber attack

ICC Suffers Sophisticated Cyber Attack During NATO Summit

Airplane at dusk with control tower showing data breach due to contact center

Qantas Data Breach: Third-Party Contact Center Platform That Stored Six Million Customer Records Hacked

Skull and bones on screen showing ransomware attack on Swiss government provider

Swiss Government’s Ransomware Attack Impacts Numerous Departments, Hacker Leaks Terabytes for Free

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2025 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results