CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Magnifying glass lies on paper showing recent IBM-Ponemon study highlighting the rising cost of a data breach
Cyber SecurityNews

IBM-Ponemon Study Highlights Rising Cost of a Data Breach

August 9, 2019
Cost of a data breach is becoming more serious every year. Latest IBM-Ponemon study reports an average figure of $3.92 million which is 12% higher than it was just five years ago.
Read More
U.S. flag flying outside capitol building showing election security currently taken as high priority issue in U.S.
Cyber SecurityNews

Election Security Now a High-Priority Issue in United States

August 9, 2019
With lessons learned from 2016 U.S. presidential election, U.S. government officials are taking no chances in upcoming election security by pushing stricter measures to secure online information from cyber attacks.
Read More
Man face blended with binary code digits showing major international companies being attacked by Winnti malware
Cyber SecurityNews

Winnti Malware Rampages Through Major International Companies

August 7, 2019
Winnti malware makes a “comeback”, victimizing major international firms including Bayer, BASF, Siemens and others. The attackers are particularly interested in industrial secret and tracking movements of specific people.
Read More
Hands in handcuffs using laptop showing how technology has transformed insider fraud and yet being used in fighting back
Cyber SecurityInsights

How Technology Transformed Insider Fraud – and How New Technology Is Fighting Back

August 7, 2019
With the aid of technology, insider fraud has outranked all other forms of fraud for modern businesses, ironically the companies are also using it to pre-emptively stop fraudsters in their tracks.
Read More
Hacker working on laptop showing the five ways to prevent Capital One Breach from happening to organizations
Cyber SecurityInsights

Five Ways to Prevent the Capital One Breach from Happening to You

August 6, 2019
A poorly configured Amazon cloud database resulted in the Capital One breach exposing information of 106 million U.S. and Canadian customers and applicants. What are the five steps that organizations can take to prevent such attacks?
Read More
Shop front of store closing down showing majority of small businesses not taking cyber attacks seriously as shown in recent SMB study
Cyber SecurityNews

SMB Study Reveals Majority of Small Businesses Aren’t Taking Cyber Attacks Seriously

August 5, 2019
Majority of SMBs still do not believe they will be likely targets of cyber attacks despite the fact that 60% of the companies go out of business within six months after suffering an attack.
Read More
Orange flashing siren lights showing the rise of global cyber war threat
Cyber SecurityInsights

The Rise of the Global Cyber War Threat

August 5, 2019
Global cyber war no longer seems impossible with state-sponsored cyber attacks mounting around the world and possibility of China, Iran and Russian uniting to go against U.S. in the cyber domain.
Read More
Businessmen analysing finances showing how the company keeps their reputation intact despite the projected cost of $75 million for Norsk Hydro cyber attack
Cyber SecurityNews

Reputation Intact Despite Projected Cost of $75 Million for Norsk Hydro Cyber Attack

August 2, 2019
Even though Norsk Hydro cyber attack is projected to cost the company $75 million, the refusal to pay ransom and transparent working with law enforcement during the attack could mean a new standard for cyber security.
Read More
Computer code on a screen with a skull showing researchers using a few simple strings in code to trick Cylance antivirus into thinking malware as trusted software
Cyber SecurityNews

Researchers Trick Cylance Antivirus Into Thinking Malware Is Trusted Software

August 2, 2019
Just a few simple strings on malware are all it takes to defeat Cylance antivirus software. This is a crushing blow for those who predicted AI and machine learning are the future of antivirus protection.
Read More
Padlock on computer keyboard showing Kazakhstan government intercepting citizens’ web traffic as part of Internet surveillance
Cyber SecurityNews

Kazakhstan Internet Surveillance Plan Involves Intercepting Citizens’ Web Traffic

August 1, 2019
All citizens in Kazakhstan are forced to install a government-issued national security certificate as part of Internet surveillance strategy. This certificate will allow government to read all their messages or even alter them.
Read More
1 … 135 136 137 138 139 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results