CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Server rack room showing evolving from VPN to SDP
Cyber SecurityInsights

The Evolution From VPN to SDP Won’t Happen Overnight

September 8, 2020
While VPNs do function well when it comes to tunneling and encrypting data from authorized users, there are a couple of significant catches. Is software defined perimeter (SDP) the answer?
Read More
Digital global world map showing ransomware attack
Cyber SecurityInsights

The Evolution of Ransomware: Four Predictions to Shape Your Security Strategy

April 13, 2021
For organizations faced with highly sophisticated and targeted attacks from well-resourced cybercrime groups, standard AV and EDR platforms are of little use against ransomware.
Read More
Man working on laptop in cafe showing evolving role of the CISO in digital transformation
Cyber SecurityInsights

The Evolving CISO: From Naysayer to Enabler

June 3, 2021
Instead of only focusing solely on how to protect the existing environments, CISOs must also aim to provide the right environment for secure business innovation.
Read More
Hook picking up key on keyboard showing phishing attacks
Cyber SecurityInsights

The Fault in Our Emails: Why Everyone Still Falls for Phishing Attacks

February 25, 2021
Learn why our brains are destined to eventually fall for phishing attacks and how cybercriminals have adapted to modern work practices to make phishing emails more successful.
Read More
Hooded hacker working on laptop with code overlaying image showing ransomware attacks treated as terrorism
Cyber SecurityNews

The FBI and DOJ Compare Ransomware Attacks to Terrorism, Adopts Coordinated Approach

June 14, 2021
The DOJ elevated the priority of ransomware attacks, comparing them to terrorism and directing U.S. Attorneys to coordinate investigations through the ransomware task force.
Read More
Virus background against digital Russian flag showing Russian GRU botnet malware
Cyber SecurityNews

The FBI Disrupted Russian GRU Botnet Malware Through a Court Order Before It Could Be Weaponized

April 15, 2022
The operation disrupted Russian GRU control over infected devices by removing Cyclops Blink botnet malware from the infected WatchGuard Firebox devices used as command-and-control (C2) servers.
Read More
Front of FBI building showing the increase of public cyber security alerts from FBI
Cyber SecurityNews

The FBI Is Stepping up Its Public Cyber Security Alerts as Criminals Take Advantage of Pandemic Conditions

April 14, 2020
FBI is issuing more cyber security alerts than usual, covering human trafficking, COVID-19 scams, vulnerabilities in networking platforms and cloud-based business email compromise campaigns.
Read More
Man touching a training icon on virtual screen showing the four Es to overcome cybersecurity talent shortages with training
Cyber SecurityInsights

The Four Es for Overcoming Cybersecurity Talent Shortages With Training

February 5, 2020
Companies globally are facing a shortage in cybersecurity talent that could be managed through training with the four Es, i.e. education, efficiency, embracing and engagement, in mind.
Read More
View from Side of Car Going Around Corner Showing How Cyber Regulator Will Determine the Future of Self Driving Cars
Cyber SecurityInsights

The FTC: The Shadow Cyber Regulator That Will Determine the Future of Self-Driving Cars

October 30, 2018
The FTC is a shadow regulator on cyber, and it is impacting what businesses must do about cybersecurity. Most troublingly, it is doing so without clear standards and in apparent self-denial. This may have wide-ranging ramifications for the future of self-driving cars.
Read More
Lab technicians looking at microscope slide showing growing importance of bio-cybersecurity to protect patient genetic data
Cyber SecurityInsights

The Growing Importance of Bio-Cybersecurity

June 4, 2019
Bio-cybersecurity is not to be taken lightly as data breach could lead to healthcare companies buying back patient data from ransomware or hackers using stolen genetic data to blackmail individuals.
Read More
1 … 135 136 137 138 139 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results