CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man in shock with computer showing the unknown cyber threats to company data assets
Cyber SecurityInsights

Unknown Threats to Your Company Data Assets

May 23, 2019
It’s not enough to just keep up to speed with the latest cyber threats as it’s the unknowns which threaten company data assets, so what do we do about the unknowns?
Read More
Padlock against hands on keyboard showing tips for businesses to prevent data breach
Cyber SecurityInsights

How to Prevent Your Data from Breaching – Tips for Businesses

May 22, 2019
Protecting your client’s private information is crucial for a business, learn more about security measures to prevent data breach and guarantee safety of information in the online world.
Read More
Speaker giving a talk in conference hall showing the communication of combined security and privacy awareness to employees
Cyber SecurityInsights

It’s Time to Combine Security Awareness and Privacy Awareness

May 22, 2019
Meet Bob. Bob’s an employee at BigCorp, and he’s confused. He’s got info security folks requiring him to take annual...
Read More
Open red padlock on a padlock background showing the rise of password spraying attacks warned by feds
Cyber SecurityInsights

Feds Warn Password Spraying Attacks on the Rise

May 21, 2019
U.S. government agencies warned of new wave of password spraying attacks with Citrix serving as one of the latest victims of such “low and slow” hacking campaigns.
Read More
Woman analyst in front of futuristic security screen showing changing threat landscape highlighted by Verizon data breach report
Cyber SecurityNews

New Verizon Data Breach Report Outlines Changing Cyber Threat Landscape

May 20, 2019
Latest 2019 Verizon data breach report highlights absence of foundation-level and layered security controls, internal security discipline, and general security awareness as the common denominators in the data breach dilemma.
Read More
Hacker working on computer showing Chinese spies using NSA cyber weapons long before Shadow Brokers hacker group released them
Cyber SecurityNews

Chinese Spies Stole NSA Cyber Weapons Before They Were Leaked by Shadow Brokers

May 20, 2019
Chinese spies known as Buckeye group are alleged to be using some of the NSA cyber weapons as early as March 2016, long before Shadow Brokers released them in April 2017.
Read More
Picture of empty office showing the struggle by companies to fill cybersecurity vacancies
Cyber SecurityInsights

Why Are Businesses Struggling to Fill Cybersecurity Vacancies?

May 17, 2019
Cybersecurity vacancies are hard to fill as companies are hiring from a pool which is not growing quick enough to meet demand, a phenomenon attributed to growing cybercrime economy and lack of extensive education to produce professionals.
Read More
Hacker working on software code showing source code breach at major anti-malware vendors by Russian hackers
Cyber SecurityNews

Russian Hackers Claim to Have Breached Major Anti-Malware Vendors; How Big Is the Threat?

May 16, 2019
Major anti-malware vendors, Symantec, McAfee, and Trend Micro, allegedly had their source code stolen by Russian hackers. The full set of data including access to the companies' networks are now going on sale for $300,000.
Read More
Group of soldiers in the smoke showing the use of active cyber defense with private sector bounty hunters
Cyber SecurityInsights

Active Cyber Defense Strategy Could Use Private Sector Bounty Hunters to Protect Critical Infrastructure

May 15, 2019
New Atlantic Council report by two former Department of Defense officials suggests that active cyber defense would represent a welcome compromise between doing nothing and going on the offensive.
Read More
Karate man breaks wall showing Israel's cyber response using missile strike
Cyber SecurityNews

What Does Israel’s Missile Strike on Hamas Hackers Mean for Military Cyber Response?

May 14, 2019
Israel's cyber response to cyber attacks launched by Hamas was to launch an air strike on a building known to be the cyber HQ for Hamas. It is believed to be the first time any military has responded to a digital threat with immediate force.
Read More
1 … 139 140 141 142 143 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results