CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Woman with high tech smart glasses showing how movies can help you understand data privacy and hacking
Cyber SecurityInsights

Movies That Can Help You Understand Data Privacy and Hacking

August 29, 2019
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Read More
Back view of developer working on code showing DevSecOps issue with vulnerability management
Cyber SecurityNews

DevSecOps Overwhelmed by Backlogs, Significant Time and Money Being Lost to Vulnerability Management

September 29, 2022
The State of Vulnerability Management in DevSecOps" study included over 16,500 IT leaders and experts. 66% of these firms say they have a backlog of more than 100,000 vulnerabilities.
Read More
Computer screen with ransomware attack alert and man holding his head
Cyber SecurityInsights

How Not To Become a Feeder for a Ransomware Scammer

December 21, 2021
Organisations which have chosen the long run tackling digital transformation over the prompt adoption strategy and try to mate it with their established internal tactics have experienced fewer ransomware attacks.
Read More
Hundreds of Argentina citizens at the beach during a sunny day showing data breach of government database
Cyber SecurityNews

Argentinian Government Database Containing ID Card Information of Entire Country Made Available on Dark Web Forum

October 25, 2021
Argentina suffered one of the most catastrophic data breaches possible last week, as access to a government database containing national ID card information for every citizen was found for sale on the dark web.
Read More
Woman using fingerprint for data access showing biometrics
Cyber SecurityInsights

Can Behavioral Biometrics Change the Future of Cybersecurity?

May 31, 2022
Depending on the use case and security scenario, users can be authenticated by combining different approaches like standard or behavioral biometrics. System can automatically and passively recognize who we are making it smooth, fast, and straightforward for the user.
Read More
Hand holding package of Ring camera showing swatting attacks
Cyber SecurityNews

Grand Jury Indicts Suspects Who Hijacked Ring Cameras to Livestream Swatting Attacks

January 5, 2023
Suspects face prison sentences after hacking email accounts to access Ring cameras, initiate and live-stream swatting attacks, and threaten and taunt responding police officers.
Read More
Man working from home and sitting in front of laptop facing cybersecurity challenges
Cyber SecurityNews

Working From Home Brings New Cybersecurity Challenges as Workers Commonly Bypass Inconvenient Measures

September 17, 2021
The mass shift to working from home precipitated by the Covid-19 pandemic created massive security challenges. A full 30% of remote workers under the age of 24 say that they circumvent or ignore security policies when they get in the way of getting work done.
Read More
Hacker working on laptop showing North Korean hackers focusing heavily on Magecart attacks
Cyber SecurityNews

New Study Reveals That North Korean Hackers Are Focusing Heavily on Magecart Attacks

July 23, 2020
North Korean hackers are focusing heavily on Magecart attacks by planting malicious code in online shopping carts of individual stores and payment processors.
Read More
Man using laptop and smartphone with virtual globe showing zero trust and digital transformation
Cyber SecurityInsights

Role of Zero Trust in Asia’s Digital Transformation Journey

November 17, 2022
While the wheels of digital transformation were set in motion much earlier, the pandemic accelerated their speed. It significantly impacted how organisations approach their IT ecosystem and security. Today’s landscape, with no perimeter, requires a Zero Trust approach.
Read More
Big Ben and Westminster Bridge in the evening showing fraud considered national security threat in UK
Cyber SecurityNews

Fraud Has Reached “Epidemic” Levels, Should Be Considered a National Security Threat by UK Government

February 8, 2021
Report from UK security think tank RUSI finds that fraud has "reached epidemic levels" in the country and that the volume of attempts should be viewed as a national security threat.
Read More
1 … 138 139 140 141 142 … 200

Latest

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

Man pointing at HR icons showing AI use in HR processes

AI in HR – How To Make Use of the New Hype in a Compliant Manner

Privacy’s Shifting Left: Are You Ready To Move?

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results