CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker working on laptop showing the extent of underground hack-for-hire services with the unmasking of Dark Basin group
Cyber SecurityNews

Unmasking of the “Dark Basin” Group Indicates the Extent of Underground Hack-For-Hire Services

June 25, 2020
Market for hack-for-hire services could be expanding significantly with recent unmasking of a Dark Basin group that has been operating in the shadows for years.
Read More
Google Chrome application icon on phone showing spyware campaign using Chrome extensions
Cyber SecurityNews

Millions Impacted by Spyware Campaign Through Malicious Google Chrome Extensions

June 25, 2020
Spyware campaign stole sensitive user information through 111 fake Google Chrome extensions which gathered over 32 million downloads on the Chrome Web Store.
Read More
Man doing online voting on laptop showing the security flaws in U.S. online voting system that raised alarm over potential vote manipulation
Cyber SecurityNews

Security Flaws in US Online Voting System Raises Alarm Over Potential Vote Manipulation

June 24, 2020
Reported security risks in U.S. online voting system OmniBallot have added to the mounting concern over vote manipulation during 2020 US presidential election.
Read More
Payment transaction with mobile showing the three reasons to prioritize PCI compliance
Cyber SecurityInsights

3 Reasons Why You Should Prioritize PCI Compliance Now

June 24, 2020
Focusing on PCI compliance is a good way to improve risk management, find out what your company can do to reduce incidents, stop cyber threats and prevent regulatory fines.
Read More
5G icon with other virtual technology icons showing how 5G networks can change an enterprise’s security threat model
Cyber SecurityInsights

How Will 5G Change Your Enterprise Threat Model?

June 24, 2020
5G networks provide lots of benefits and also unknown security risks. Organizations need to change their threat models to increase visibility, security awareness and control of the endpoints.
Read More
Man working on laptop at home showing the security risks of Shadow IT in remote working
Cyber SecurityInsights

Recovering from the Shadow IT Pandemic

June 23, 2020
Companies are facing a new “shadow IT” pandemic during COVID-19 as employees are finding their own solutions to information technology problems that often violate existing security policy.
Read More
Honda company logo showing ransomware attack highlighting the need for network segmentation
Cyber SecurityNews

Honda Ransomware Attack a Lesson in Segmentation

June 22, 2020
Suspected Snake ransomware attack on Honda highlighted the need for network segmentation to prevent impact across a company during an attack.
Read More
Woman using mobile banking app showing warning from FBI alert
Cyber SecurityNews

FBI Alert Warns of Fraudsters Targeting Mobile Banking Apps to Defraud Americans

June 22, 2020
New FBI alert warns of cybercriminals targeting mobile banking apps during the Coronavirus pandemic which has witnessed a 50% rise in adoption of online banking.
Read More
Hard disks in large storage system showing the myth of the enterprise data required to ensure a secured environment
Cyber SecurityInsights

The Myth of Enterprise Data in the Security Environment

June 19, 2020
Having hundreds or more enterprise data sources to monitor a company’s security is overwhelming and unmanageable for SecOps, what they really need is a “small data” movement.
Read More
Toy soldiers on world map showing the hidden cyber war between Israel and Iran
Cyber SecurityNews

Hidden Cyber War Between Israel and Iran Spills Into Public View With Attacks on Physical Infrastructure

June 19, 2020
Israel and Iran may be in a hidden cyber war with both countries attacking each other’s critical infrastructure, causing physical disruptions to the civilian population.
Read More
1 … 137 138 139 140 141 … 201

Latest

Girl holding smartphone with TikTok showing transparency center to stop government bans

TikTok Opens Transparency Center in Bid to Head off Government Bans

Vehicles in motion on busy motorway showing digital license plates to track vehicles

Digital License Plates: Will This New Way to Track Vehicles Enhance or Undermine Privacy?

Bank of England building showing UK financial regulator stress test report on cyber insurance

UK Financial Regulator: Country’s Cyber Insurance Providers Lack Consistency in Risk Assessments, Modeling Capability

Financial charts showing LockBit ransomware attack impact on derivative trading

ION Group Ransomware Attack Impacts Derivative Trading in Global Markets

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results