CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Tourist group having guided Segway city tour showing Magecart attack on online store
Cyber SecurityNews

Segway’s Online Store Infected With a Credit Card Skimmer Used in a Large-Scale Magecart Attack Campaign

February 4, 2022
Malwarebytes detected a credit card skimmer belonging to a potent Magecart attack threat actor on Segway's online store embedded within a favicon.ico image file.
Read More
Hackers selling initial access in underground forums
Cyber SecurityNews

Selling Network Initial Access Methods in Underground Forums Worth Millions as Brokers Turn To Private Conversations

February 8, 2021
KELA found that the sale of network initial access methods in underground forums was worth millions of dollars, and brokers resorted to selling in private conversations.
Read More
U.S. Capitol building at night showing cyber incident reporting bill for ransomware payments
Cyber SecurityNews

Senate Cyber Incident Reporting Bill Requires Many Businesses to Report Ransomware Payments Within 24 Hours

October 4, 2021
New cyber incident reporting bill that has been introduced to the Senate would create new ransomware payment reporting requirements if passed, including a strict 24-hour limit for any business with more than 50 employees.
Read More
EU flags waving in front of European Parliament building showing leak of sensitive data
Cyber SecurityNews

Sensitive Data Belonging to European Officials Leaked in a Major EU Parliament Breach

May 28, 2020
Recent disclosure reveals the EU parliament suffered a major data breach exposing sensitive data of over 1,200 elected members of the European Parliament alongside 15,000 other accounts of EU affairs professionals.
Read More
Apple company logo behind cracked screen showing the iPhone vulnerability that can be triggered by simply opening the default mail app
Cyber SecurityNews

Serious iPhone Vulnerability Triggered by Simply Opening Mail App May Have Been Present for Nearly Eight Years

May 4, 2020
New iPhone vulnerability in default iOS mail application can be triggered even without the victim clicking on an attachment or following a link on the email.
Read More
Close-up of a man's hand on a laptop keyboard showing use of shadow code
Cyber SecurityNews

Shadow Code From Third-Party Libraries Is a Major Cybersecurity Risk for Most Web Applications, Owners Afraid of Brand Damage and Lawsuits

October 1, 2021
Report shows that shadow code from third-party libraries is a risk for web applications and concern for owners afraid of brand damage, lawsuits, and regulatory actions.
Read More
Hand on keyboard with cloud icon on monitor screen showing SaaS and shadow IT
Cyber SecurityInsights

Shadow SaaS Is on the Rise in the Hybrid Work Era; Here’s How To Regain Control

July 29, 2021
IT security teams need to develop a SaaS management strategy to mitigate and address their shadow applications to mitigate the security and compliance risks shadow IT poses to their organizations.
Read More
SHAREit app with magnifying on smartphone screen showing file-sharing app security flaw
Cyber SecurityNews

SHAREit Android File-Sharing App Security Flaw Exposes Users to Remote Code Execution and Sensitive Data Leaks

February 25, 2021
Popular Android file-sharing app SHAREit with over a billion downloads has a security flaw that could leak users’ sensitive information and allow remote code execution.
Read More
Doctor with medical icons on tablet showing data breach of healthcare provider
Cyber SecurityNews

Shields Healthcare Provider Suffered A Data Breach That Exposed Personal Health Information of 2 Million Patients

June 15, 2022
Healthcare provider Shields Health Care Group suffered a data breach that exposed sensitive personal health information for at least 2 million patients.
Read More
Image of open sign on wooden door representing companies in Asia being open to engaging the global community of independent white hats
Cyber SecurityInsights

Should Companies in Asia Engage the Global Community of Independent White Hats?

February 19, 2016
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.
Read More
1 … 133 134 135 136 137 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results