CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Concept of leaky software data with a tap sticking out showing largest email data breach in history
Cyber SecurityNews

Largest Leak in History: Email Data Breach Exposes Over Two Billion Personal Records

April 8, 2019
Thanks to some unsecured public-facing databases, Verifications.io email data breach has set a new record for leaking 2 billion personal records which can be useful for identity theft and scams.
Read More
European union flag against parliament showing cybersecurity challenges released in new briefing paper by European Court of Auditors
Cyber SecurityInsights

New Briefing Paper From European Court of Auditors Outlines Cybersecurity Challenges Facing Europe

April 4, 2019
European Court of Auditors recently released a comprehensive report detailing the cybersecurity challenges facing the European Union in 2019 and beyond, and how best to respond to the growing number of cyber threats.
Read More
5G and the Future of Cybersecurity
Cyber SecurityInsights

5G and the Future of Cybersecurity

April 4, 2019
Since 5G is not simply a faster version of 4G, but rather, an entirely new network architecture, it opens the door to entirely new security models for user privacy, identity management, and threat detection.
Read More
Hacker programming in technology environment showing profitability of cyber extortion
Cyber SecurityInsights

New Report Shows Just How Profitable Cyber Extortion Can Be

April 4, 2019
In just a few years, cyber extortion has gone from a fringe hacking activity to something that is now very much mainstream. In fact, it’s now possible for hackers to make upwards of $360,000 per year by joining a cyber extortion team.
Read More
Smart house home automation devices showing need to ensure security when inviting automation into our homes
Cyber SecurityInsights

Should We Leave Automation to the Workplace?

April 3, 2019
Automation is no longer an office-only reality. How can we ensure security when inviting automation into our homes? Should we be auditing smart home technology in the same way we audit our office automation?
Read More
Telecommunications tower against dark sky showing Huawei's challenges
Cyber SecurityNews

Huawei Challenges United States on Constitutionality of Equipment Ban

March 29, 2019
Huawei hits back at the United States after it's PR charm offensive including opening up it's source code went nowhere. It reminded the world of the biggest scandal of the century – the PRISM program and Five Eyes surveillance.
Read More
Three runners sprinting outdoors showing the cybersecurity arms race
Cyber SecurityInsights

How to Win the Cybersecurity Arms Race: A Guide for Corporations and Nations

March 29, 2019
As organizations realize that there is no such of a thing as being “fully protected” from a cyberattack, what are the tactices and steps to improve and get an edge in the cyber security arms race?
Read More
Man holding umbrella walking into a laptop with lightning on the screen showing how insurers have a role in tackling cyber threats
Cyber SecurityInsights

How Insurers Can Tackle Cyber Threats in the Digital Age

March 27, 2019
Insurers have a vital role to play in inoculating organizations against potentially crippling attacks. With cyber insurance premiums forecast to reach $7.5 billion by 2020, how can insurers do their part to leverage this opportunity for the benefit of customers in today’s digital world?
Read More
Hacker working on multiple computers showing the impact of data breach by Iranian hackers
Cyber SecurityNews

Massive Citrix Data Breach Thought to be the Work of Iranian Hackers

March 25, 2019
Citrix is the latest big name to fall victim to a major data breach. The data breach is thought to have been perpetrated by Iranian hackers in a group called IRIDIUM, which is believed to have ties to the country's government.
Read More
Joining hands together as a team showing the need to focus on both information security and data privacy
Cyber SecurityInsights

The Nexus of Information Security and Data Privacy: Why Focusing on Both Can Keep Us Safer

March 22, 2019
What kind of future can be achieved by focusing on the nexus of information security and data privacy? Better compliance, stronger alignment and greater accountability, just to name a few benefits.
Read More
1 … 137 138 139 140 141 … 158

Latest

Swiss National Bank and Parliament illuminated at night showing Swiss banking secrecy

Swiss Government Proposes Backdoor in Its Banking Secrecy Laws for Spy Agency; Pressure Applied by UN Over Human Rights Concerns

Young man looking at laptop computer in the dark showing Great Resignation increased risks of intellectual property theft

How To Protect Company IP During the Great Resignation

Market price display at street in the night showing RTB adtech exposing online behavior data

Report on RTB: Adtech “Biggest Data Breach Ever Recorded,” Online Behavior More Exposed in Countries Without Privacy Regulations

Security researchers working together in front of computer monitors showing DOJ rules on CFAA

DOJ Rules “Good Faith” Security Researchers Will No Longer Be Prosecuted Under CFAA

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results