CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Close-up of a combination dial on an antique safe showing zero trust security
Cyber SecurityInsights

The Ocean’s Eleven Casino Vault Could Have Used Zero Trust Security

March 14, 2022
Bypassing of security during the successful heist of the Bellagio vault came down to identity and perimeter defenses, the main vulnerabilities of network security—and exactly the weaknesses that zero trust methodology fortifies for organizations.
Read More
Two surgeons looking at screen showing need to amend HITECT Act for healthcare sector
Cyber SecurityInsights

The Pandemic Affecting the Healthcare Sector – A Call for Amending the HITECH Act

October 21, 2020
With specific guidance from an amended HITECH Act to include a comprehensive cyber policy, the healthcare industry will better secure patients’ data.
Read More
An exterior photo of the Google building which company was taken $100 million along with Facebook through phishing scam
Cyber SecurityNews

The Phishing Scam That Took Google and Facebook for $100 Million

April 9, 2019
Posing as Quanta Computer, Lithuanian took $100 million from Google and Facebook through a phishing scam involving email spoofing and forged paperwork. How can companies protect themselves against business email compromise?
Read More
Image of brain and concept of AI and machine learning for cybersecurity
Cyber SecurityInsights

The Promise and Challenges of AI and Machine Learning for Cybersecurity

November 28, 2019
Technologies like AI and Machine Learning can give companies a competitive lead in terms of information security and data safety. How can these technologies support cybersecurity?
Read More
Man inspecting car showing need for vehicle cybersecurity
Cyber SecurityInsights

The Race for Cybersecurity Regulation Compliance is On

May 12, 2021
New standards are requiring OEMs and Tier-1s to implement cybersecurity solutions that are comprehensive and can operate throughout the lifecycle of the vehicle.
Read More
Opened security lock on computer printed circuit board showing identity management and machine identities
Cyber SecurityInsights

The Rise of Software “Machines” Requires a New Type of Identity Management

September 9, 2021
Attackers who are blocked by strong defenses in other areas, are exploiting exposures from mismanaged machine identities to exploit the trust these systems are designed for.
Read More
Image of businessman with cape looking at the sunrise signifying the rise of the chief security and privacy officer
Cyber SecurityInsights

The Rise of the Chief Security and Privacy Officer

September 21, 2016
Recently, we examined some of the challenges that companies face in terms of the evolving privacy and data protection landscape - and how these challenges may require a whole new breed of information security professional. In this second part of the series we unpack the argument for a new role combining Chief Security Officer and Chief Privacy Officer in a rapidly evolving regulatory and threat rich environment. We also chat with Chief Security and Privacy Officer (CSPO) at a Fortune 500 company to get his take on the subject.
Read More
Orange flashing siren lights showing the rise of global cyber war threat
Cyber SecurityInsights

The Rise of the Global Cyber War Threat

August 5, 2019
Global cyber war no longer seems impossible with state-sponsored cyber attacks mounting around the world and possibility of China, Iran and Russian uniting to go against U.S. in the cyber domain.
Read More
Dead cockroach on table showing the need to design right crowdsourced security testing model for bug bounties
Cyber SecurityInsights

The Romance of Bug Bounties

July 16, 2019
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns.
Read More
Virtual shields over the globe showing use of SASE for Zero Trust
Cyber SecurityInsights

The SASE Revolution: When Network and Security Converge at Edge

May 26, 2021
To achieve the full promise of cloud and digital transformation, enterprises must transform not just their networking but also security architectures. SASE is moving organisations in this new direction.
Read More
1 … 138 139 140 141 142 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results