CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Lock Icon showing AI and cybersecurity
Cyber SecurityInsights

Navigating the Ethical Landscape of AI in Cybersecurity

August 14, 2023
With its ability to analyze vast amounts of data quickly and accurately, AI can augment human capabilities and improve overall cybersecurity measures. However, there are also concerns surrounding its development and implementation. One of the biggest concerns is the question of control.
Read More
Cyber security IT engineer working showing cyber security career
Cyber SecurityInsights

Navigating Your Path to a Career in Cyber Security: Practical Steps and Insights

August 30, 2023
Landing a job in cyber security may require persistence and continuous learning, so it's important to keep refining your skills, networking, and seeking new opportunities.
Read More
Mobile phone with hacked sign showing NCSC warning of malicious apps in app stores
Cyber SecurityNews

NCSC Warns About Malicious Apps on App Stores, Chief Backs New Consumer Regulations

May 17, 2022
The U.K’s National Cybersecurity Centre (NCSC) report addressed the threat posed by malicious apps downloaded through official and third-party app...
Read More
Hand pointing at screen with warning alert showing cyber attack on Oregon DMV and Louisiana OMV driver's license
Cyber SecurityNews

Nearly 10 Million Driver’s License Holders Exposed in the Oregon DMV and Louisiana OMV Cyber Attack

June 23, 2023
Oregon DMV and Louisiana OMV were impacted by the MOVEit cyber attack exposing sensitive information of virtually all the states’ ID and driver’s license holders.
Read More
MSI motherboard on a dark background showing Secure Boot issues
Cyber SecurityNews

Nearly 300 MSI motherboards Have a Serious Secure Boot Default Configuration Flaw

February 9, 2023
A firmware update introduced a serious Secure Boot default configuration flaw on nearly 300 MSI motherboards that could allow the execution of malware during PC startup.
Read More
Mobile phone on a computer keyboard with the WhatsApp logo showing data leak sold on dark web
Cyber SecurityNews

Nearly 500 Million WhatsApp Records Allegedly Stolen in Data Leak, Offered on Dark Web for a Few Thousand Dollars

December 5, 2022
Threat actor is offering the alleged WhatsApp data leak for a relatively low cost, dividing it up by country of origin and offering each package for prices in the range of several thousand dollars via a dark web forum.
Read More
Side view of laptop on desktop with digital emails showing accidental data loss
Cyber SecurityNews

Nearly 60% Of Organizations Suffered Accidental Data Loss via Email in Last 12 Months

May 27, 2022
Research found that email was the riskiest channel for accidental data loss, accounting for 65% of data losses, ahead of cloud sharing and instant messaging platforms.
Read More
Wooden blocks of people icon showing value of data
Cyber SecurityInsights

Need a Bigger Budget? Value Your Data

August 2, 2021
We're storing too much sensitive information, and our budgets are way too small to protect it. As long as we continue to undervalue data, we will underspend on protecting it.
Read More
Image of hacker laughing representing not letting a good data breach go to waste
Cyber SecurityInsights

Never Let a Good Data Breach Go To Waste

November 22, 2017
If a massive data breach has been in the news recently – such as the Equifax data breach that impacted more than 143 million Americans – there’s a good chance that other hackers will capitalize on this public data breach to cause greater harm to victims, and open up those already victimized to even more risk.
Read More
Cat playing with little mouse on the table showing cyber attack on unsecured databases
Cyber SecurityNews

New “Meow” Cyber Attack That Wipes Unsecured Databases Is a Malicious Throwback

August 4, 2020
"Meow" cyber attack seeks out unsecured databases and simply wipes them out without seeking either fame or material gain, as a form of activism or perhaps just for fun.
Read More
1 … 136 137 138 139 140 … 234

Latest

Room with modern computers showing cybersecurity skills gap and MSSPs

Can MSSPs Close the Cybersecurity Skills Gap?

OpenAI logo on phone screen showing EU GDPR complaint and AI

Another EU Investigation for ChatGPT Following Poland GDPR Complaint

Meta logo on device screen showing EU ban for Meta tracking ads

Norwegian DPA Seeks to Expand Fine on Meta for Tracking Ads, Raises Possibility of an EU Ban

Aerial view of cement factory showing ransomware attack on industrial control systems manufacturer

Johnson Controls International Suffered a Massive Ransomware Attack Potentially Impacting the DHS

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results