CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man holding tablet with metrics and graph showing risks for information assets
Cyber SecurityInsights

How To Define Risks for Your Information Assets

November 22, 2021
To define risks, learn where they come from, and what their effect on information assets and the operation of your company is. In this article learn about IT assets and risks.
Read More
Team of programmers writing software code showing use of third-party scripts
Cyber SecurityInsights

Can Third-Party Scripts Be Labeled Safe or Unsafe?

February 17, 2022
With client-side security and JavaScript-related attacks staring us in the face these days, a probable question that many business owners or developers may ask is, “Can I truly determine if a third-party script is secure or not?”
Read More
Virtual locks over the globe showing defense for ransomware attacks
Cyber SecurityInsights

5 Defenses for 5 Ransomware Root Causes

December 6, 2021
Ransomware groups have shifted from the automated, ‘spray and pray’ tactics of yesterday to highly targeted, human-operated ransomware attacks, carefully crafted to find and encrypt your data and cause maximum critical service disruption.
Read More
Tired businessman at desk showing the BEC attacks on three British and Israeli banks for $1.3 million
Cyber SecurityNews

BEC Attacks by “The Florentine Banker” Strike Three British and Israeli Banks for $1.3 Million

May 14, 2020
$1.3 million BEC attacks on three large financial services companies in U.K. and Israel shows how far cyber criminals are willing to go and what they are capable of.
Read More
Police car on the street showing Swedish police given the powers to deploy spyware on devices of suspected criminals.
Cyber SecurityNews

Swedish Police Given Green Light For Spyware

November 11, 2019
Swedish police will be given powers to deploy spyware on devices of suspected criminals. The spyware could turn on cameras, microphones, and access encrypted chat logs or images stored on the device.
Read More
Toy robot in front of screens with program code showing bot traffic
Cyber SecurityNews

Bot Traffic Responsible For 40% Of Internet Activity and Interferes With COVID-19 Vaccine Rollout and Online Shopping

April 26, 2021
Imperva found that bot traffic accounted for 40% of internet activity. Malicious scripts were responsible for 26% of website visits and could interfere with the COVID-19 vaccine.
Read More
Woman inside car pressing hazard lights button showing the threats of cyber attacks on connected cars
Cyber SecurityNews

Connected Cars: A New and Dangerous Vector for Cyber Attacks

August 12, 2019
The threat of cyber attacks on connected cars is getting very real as report shows majority of new smart vehicles from top 10 auto manufacturers are vulnerable and will be connected to Internet.
Read More
Business man standing with umbrella showing cyber insurance
Cyber SecurityInsights

Putting Skin in the Cyber Insurance Game

January 13, 2022
Cyber insurance premiums have jumped 73% in the U.S alone. Greater specificity over what is (and what is not) covered has become a feature of many updated policies, as has the expectation that companies need to have greater cybersecurity hygiene in place in order to qualify for insurance.
Read More
Image of businessman with cape looking at the sunrise signifying the rise of the chief security and privacy officer
Cyber SecurityInsights

The Rise of the Chief Security and Privacy Officer

September 21, 2016
Recently, we examined some of the challenges that companies face in terms of the evolving privacy and data protection landscape - and how these challenges may require a whole new breed of information security professional. In this second part of the series we unpack the argument for a new role combining Chief Security Officer and Chief Privacy Officer in a rapidly evolving regulatory and threat rich environment. We also chat with Chief Security and Privacy Officer (CSPO) at a Fortune 500 company to get his take on the subject.
Read More
Team of programmers working on software
Cyber Security

Why Developer-First Is the Future of Application Security (And How to Choose a Platform)

January 31, 2022
This article discusses why developer-first AppSec is the future and how organizations can evaluate tools that will help them adopt a developer-first approach.
Read More
1 … 139 140 141 142 143 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results