CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them?
Read More
Man pressing at fingerprint scanner on virtual screen showing the data breach of biometrics database which exposed 28 million records of facial recognition and fingerprint data
Cyber SecurityNews

Breach of Biometrics Database Exposes 28 Million Records Containing Fingerprint and Facial Recognition Data

August 27, 2019
A recent breach of biometrics giant Suprema has exposed 28 million records of facial recognition and fingerprint data including unencrypted username-password combinations stored in plain text.
Read More
Picture of an opened door showing election systems in 10 U.S. states found to be connected to Internet
Cyber SecurityNews

Internet-Connected Election Systems Found in 10 U.S. States

August 22, 2019
ESS, largest voting systems company in U.S with at least 260,000 machines in 21 states, was found to have 35 election systems in 10 states connected to the internet when they were not supposed to be.
Read More
Wall-shaped binary codes showing the impact of artificial intelligence on cyber security
Cyber SecurityInsights

The Impact of Artificial Intelligence on Cyber Security

August 22, 2019
It’s no debate that artificial intelligence has both positive and negative impacts when used to defend against cyber attacks. One way to deal with it is to combine traditional techniques with AI tools when developing a cyber security strategy.
Read More
Hacker working on computer showing how North Korea is funding its WMD program with cybercrime
Cyber SecurityNews

North Korea Funding Its WMD Program With Cybercrime

August 20, 2019
New UN report discloses how North Korea has financed its WMD program with more than $2 billion from cybercrime against world’s largest financial institutions and cryptocurrency exchanges.
Read More
Hexagonal grid and padlocks showing the unknown extent of damage for State Farm’s credential stuffing attack
Cyber SecurityNews

Extent of Damage for State Farm Credential Stuffing Attack Still in Question

August 19, 2019
State Farm, the insurance giant with more than 83 million customers, was hit by a credential stuffing attack with unknown number of customer accounts compromised.
Read More
Trainees feeling bored in office training showing the common problems and limitations of cyber security awareness training
Cyber SecurityInsights

Common Problems and Limitations Of Cyber Security Awareness Training

August 16, 2019
With people being the weakest links in cyber attacks, why are companies not focusing on cyber security awareness training for their employees or making them more effective?
Read More
Hacker working on laptop showing the aftermath questions over Capital One data breach
Cyber SecurityInsights

What Happens Next After the Massive Capital One Data Breach

August 15, 2019
The massive Capital One data breach has triggered many to question the benefits of buying cyber insurance, the risks in storing data in the cloud and what consumers should do when faced with a breach.
Read More
Businessmen playing dominoes block game showing different ways to run risk mitigation to manage security threats
Cyber SecurityInsights

Managed Services and Risk: Mitigation or Inherent Acceptance?

August 15, 2019
It’s easy to forget what cybersecurity is – the art of dealing with risk. Organizations' risk mitigation strategy must be aligned with the service provider for effective managed detection and response.
Read More
Group of surgeons working in surgical theatre showing the email security setbacks unique to healthcare
Cyber SecurityInsights

3 Email Security Setbacks Unique to Healthcare

August 14, 2019
Phishing is a massive cyber security threat and very much still plagues the healthcare industry. What are the email security setbacks faced by the healthcare providers which make them vulnerable?
Read More
1 … 140 141 142 143 144 … 171

Latest

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results