CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Businessman presses virtual button for SAP security
Cyber SecurityInsights

Four Best Practices for Increasing SAP’s Security Posture

January 18, 2022
An attack on SAP systems can have a devastating impact on business operations, greatly affecting finances and reputation. Here are four ways to increase SAP security
Read More
Tesla cars charging at Tesla super charger electric car charging station showing remote control vulnerability in third party software
Cyber SecurityNews

Digital Joyriding: Teenager Hacks Third Party Software in Tesla Cars, Enables Remote Control of Electrical and Security Systems

January 18, 2022
A 19-year-old "security specialist" has found a vulnerability in third party software used by certain Tesla vehicles, which allows the remote control of certain functions such as the engine and the security system.
Read More
Night view of Makati the business district of Metro Manila showing data breach of Comelec
Cyber SecurityNews

Reported Comelec Data Breach Provides Attackers With Inside Information on Philippines Election Systems; Election Body Claims Nothing Happened

January 18, 2022
Manila Bulletin, the largest English-language newspaper in the Philippines, says that a serious data breach of the country's Commission on Elections (Comelec) occurred. Comelec called it "fake news" and claimed that it never happened.
Read More
Hand holding digital hologram cloud sign on city background showing cloud computing
Cyber SecurityInsights

5 Reasons Cloud Won’t Save You Money

January 19, 2022
As the use of cloud has grown and matured, so too has the recognition of a need for financial discipline in its management. In much the same way that DevOps applies a developer perspective to IT operations, FinOps will apply financial rigor to cloud.
Read More
Twitter logo on computer screen through a magnifying glass showing vulnerability management based on mentions
Cyber SecurityNews

Is Twitter the Best Tool for Vulnerability Management? Study Finds Twitter Mentions Outperform CVSS by 2x

January 19, 2022
New report indicates that Twitter may have great value as a vulnerability management tool. Twitter mentions are twice as good as CVSS when it comes to measuring an organization's potential exploitability.
Read More
Hacker working with tablet at table and flag of Russia on background showing cyber attack on Ukraine government websites
Cyber SecurityNews

Ukraine Government Websites Weather Cyber Attack Campaign, Strongly Suspected to Come From Russia

January 19, 2022
Russia's current conflict with Ukraine is so far playing out with cyber attacks rather than physical warfare. A series of defacement attacks on government websites appears to be the opening salvo.
Read More
Close up of hacker hand using laptop with email icons showing phishing-as-a-service
Cyber SecurityInsights

Phishing-as-a-Service Brings Cybercrime to the Masses

January 20, 2022
Historically, to become a successful hacker, you had to have the knowledge and skills to create your own attacks from scratch. However, all that has changed with the proliferation of the underground market for phishing-as-a-service.
Read More
Aerial view of Kyiv, Ukraine showing destructive malware
Cyber SecurityNews

Microsoft Security Report: Destructive Malware Found To Be Targeting Ukrainian Organizations

January 20, 2022
The destructive malware that is currently being spread in Ukraine acts like ransomware in that it locks up target systems by encrypting key files, but there is no payment option.
Read More
Boy and father playing games showing account takeover via phishing and social engineering
Cyber SecurityNews

EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks

January 20, 2022
EA introduced new security measures to prevent account takeover attacks after hackers successfully breached high-profile players’ accounts via phishing and social engineering attacks.
Read More
Police putting handcuffs on hacker showing arrests of REvil ransomware gang
Cyber SecurityNews

14 Members of REvil Ransomware Gang Arrested in Russia

January 21, 2022
The REvil ransomware gang has been a point of special focus for international law enforcement and possibly been dealt a fatal blow as Russian authorities have rounded up 14 members residing in the country.
Read More
1 … 136 137 138 139 140 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results