CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Microsoft building showing zero-day remote code execution
Cyber SecurityNews

Zero-Day Remote Code Execution Vulnerability Found in Microsoft Office; No Patch Yet, But Possible Fix Available

June 3, 2022
A zero-day remote code execution vulnerability in Microsoft Office has come to light, and is considered very serious due to potential for code execution if a victim opens a malicious document in Word.
Read More
Smart home concept showing IoT security and privacy flaws in smart devices
Cyber SecurityInsights

New Study Highlights IoT Security and Privacy Flaws in Popular Off the Shelf Devices

February 17, 2019
New report detailed a wide variety of IoT security and privacy flaws in common smart devices bought off-the-shelf from major retailers. Some of which are sending personal information to third party companies in China.
Read More
Hand pointing at shield showing cloud service provider
Cyber SecurityInsights

Demystifying the Cloud Service Provider Relationship

October 14, 2022
By truly understanding the service level agreements of a cloud service provider, enterprises can ensure that the joint responsibility of securing data, applications and processes is maintained, allowing IT teams to create a comprehensive cybersecurity strategy.
Read More
Skyline of Ho Chi Minh with Saigon River, looking into the future with Vietnam's controversial new cyber law and freedom of speech
Cyber SecurityNews

Vietnam’s Controversial New Cyber Law Could Entangle Google and Facebook in a Battle Over Freedom of Speech

January 14, 2019
Vietnam’s controversial new cyber law went into effect on Jan 1, 2019. Google and Facebook has reason to be cautious about entering into what could easily become a global discussion over freedom of speech.
Read More
Robot toys getting instructions from boss robot showing the threat of IoT botnet and DDoS
Cyber SecurityInsights

When the Internet of Things (IoT) Is Armed as an IoT Botnet

January 5, 2021
Many IoT devices can easily be hijacked, weaponized and made part of IoT botnets to launch DDoS attacks, it’s called the DDoS of Things.
Read More
Company signboard Olympus on building showing ransomware attack
Cyber SecurityNews

Olympus Suffers a Suspected BlackMatter Ransomware Attack

September 23, 2021
Japanese tech giant Olympus suffered a suspected BlackMatter ransomware attack in early August that disrupted operations in its European, Middle East, and African operations.
Read More
Remote worker on online video conference call showing SASE and security and network architecture
Cyber SecurityInsights

What Your Architecture Needs To Ride the SASE Wave

November 18, 2022
Implementing SASE is unlike rolling out any other technology. It requires dedicated coordination between security and networking teams, a streamlined security and networking architecture, and a fundamental understanding of the business goals and current processes.
Read More
Finger pointing at open lock showing increase in cyber attacks during COVID-19
Cyber SecurityInsights

Cyber Attacks Are Growing More Sophisticated During the COVID-19 Pandemic; Here’s How to Defend Against Them

November 9, 2020
Protect your company and customers by layering multiple security protections against cyber attacks including employee education, strong authentication, passive biometrics and behavioral analytics.
Read More
Executives making board decisions on cybersecurity spending
Cyber SecurityNews

Board Decisions on Cybersecurity Spending Primarily Driven by Known Quantities: Compliance Requirements, Responses To Existing Incidents

October 23, 2020
Thycotic survey of global CISOs shows that board decisions about cybersecurity spending are decidedly reflexive, with the primary drivers being fear of regulatory penalties or the costs of a repeat breach.
Read More
Front of FBI building showing the increase of public cyber security alerts from FBI
Cyber SecurityNews

The FBI Is Stepping up Its Public Cyber Security Alerts as Criminals Take Advantage of Pandemic Conditions

April 14, 2020
FBI is issuing more cyber security alerts than usual, covering human trafficking, COVID-19 scams, vulnerabilities in networking platforms and cloud-based business email compromise campaigns.
Read More
1 … 136 137 138 139 140 … 200

Latest

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

Man pointing at HR icons showing AI use in HR processes

AI in HR – How To Make Use of the New Hype in a Compliant Manner

Privacy’s Shifting Left: Are You Ready To Move?

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results