CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Businessmen in celebration party showing the third party risks faced by companies in the digital world
Cyber SecurityInsights

Third-Party Risks in the Digital World: Do You Know Who Else Is Coming to the Party?

September 6, 2019
Third-party systems form a critical component of customer experience in current digital marketplace. Companies should be aware of third party risks at all times while reaping the benefits of the increased integration.
Read More
Hacker working on computer showing how company can keep up with ethical hacking
Cyber SecurityInsights

Ethical Hacking is Evolving – Here’s How Your Company Can Keep Up

September 5, 2019
Companies are opening up to latest cybersecurity strategies like ethical hacking to unearth their digital vulnerabilities. What could they do to ensure the hackers do not endanger their data?
Read More
Man with umbrella against binary number background showing the risks in current cyber insurance market
Cyber SecurityInsights

Cyber Insurance: You Get What You Pay For

September 3, 2019
Boom in cyber insurance market is no surprise with high-profile data breaches happening one after another. Do companies really understand what they are covered for?
Read More
Cyber laser target on city at night showing concerns over Israel easing rules on cyber weapons used for cyber espionage
Cyber SecurityNews

Concerns Mount as Israel Eases Rules on Cyber Weapons for Cyber Espionage

September 2, 2019
Israel may become a big export player for both offensive and defensive cyber weapons used for cyber espionage as it now takes as little as four months for approval of sale.
Read More
Woman using laptop with malware icon showing the massive ransomware attack which hit 22 cities and towns in Texas
Cyber SecurityNews

Massive Ransomware Attack in Texas Hits 22 Cities and Towns, Hackers Demand Millions in Payment

September 2, 2019
Agencies of nearly two dozen small cities and towns in Texas were hit with a ransomware attack that crippled key city services like payment processing operations and printing of identity documents.
Read More
Woman with high tech smart glasses showing how movies can help you understand data privacy and hacking
Cyber SecurityInsights

Movies That Can Help You Understand Data Privacy and Hacking

August 29, 2019
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Read More
Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
Read More
Man pressing at fingerprint scanner on virtual screen showing the data breach of biometrics database which exposed 28 million records of facial recognition and fingerprint data
Cyber SecurityNews

Breach of Biometrics Database Exposes 28 Million Records Containing Fingerprint and Facial Recognition Data

August 27, 2019
A recent breach of biometrics giant Suprema has exposed 28 million records of facial recognition and fingerprint data including unencrypted username-password combinations stored in plain text.
Read More
Picture of an opened door showing election systems in 10 U.S. states found to be connected to Internet
Cyber SecurityNews

Internet-Connected Election Systems Found in 10 U.S. States

August 22, 2019
ESS, largest voting systems company in U.S with at least 260,000 machines in 21 states, was found to have 35 election systems in 10 states connected to the internet when they were not supposed to be.
Read More
Wall-shaped binary codes showing the impact of artificial intelligence on cyber security
Cyber SecurityInsights

The Impact of Artificial Intelligence on Cyber Security

August 22, 2019
It’s no debate that artificial intelligence has both positive and negative impacts when used to defend against cyber attacks. One way to deal with it is to combine traditional techniques with AI tools when developing a cyber security strategy.
Read More
1 … 132 133 134 135 136 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results