CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Woman in front of modern graphic interface showing data ecosystem and data governance
Cyber SecurityInsights

How the Modern Data Ecosystem Broke Data Governance

May 18, 2022
Technologies have helped creating a comprehensive modern data ecosystem deliver data value easier and faster may have made data governance and protection appear more difficult.
Read More
Digital world and data transmission on laptop showing digital transformation and data strategy
Cyber SecurityInsights

DX 2.0 Demands a Sustainable and Secure Data Strategy

May 19, 2022
A sustainable data strategy focuses on good data rather than big data. With good data at the nucleus of DX efforts, a clear data strategy can support growth catalysis within the business and among its employees, empowering customers and other stakeholders.
Read More
Sad teenager crying in school yard showing impact of ransomware attack
Cyber SecurityNews

Double Blow of Ransomware Attack and Covid-19 Pandemic Shutters 157-Year-Old Lincoln College

May 19, 2022
Already struggling to cover operating costs, the final blow for Lincoln College was a December 2021 ransomware attack that crippled systems used for student recruitment, retention programs and fundraising.
Read More
Network operations center showing cyber attacks on MSPs
Cyber SecurityNews

Five Eyes Alliance Warns of Cyber Attacks on MSPs and Potential Espionage and Ransomware Deployment

May 19, 2022
A multinational cybersecurity advisory warned that cyber attacks on managed service providers (MSPs) could enable supply chain attacks, ransomware, and cyber espionage downstream.
Read More
National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware
Cyber SecurityNews

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

May 20, 2022
The threat of a coup from the Conti ransomware gang is almost certainly hollow, but it showcases the boldness with which these groups are operating even after international law enforcement operations took out previous line-crossers.
Read More
Police car with roof mounted strobe lightbar showing law enforcement data breach
Cyber SecurityNews

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

May 20, 2022
A data breach on DEA's Law enforcement system reportedly granted administrators of doxxing and swatting website Doxbin and linked to Lapsus$ hacking group access to at least 16 databases.
Read More
Board members sits at a table in a meeting room showing personal liability
Cyber SecurityInsights

Personal Liability for Directors Who Disregard Cybersecurity

May 23, 2022
Trend has begun to emerge for cybersecurity incident-related shareholder derivative lawsuits – attorneys are increasingly now filing claims specifically based on failures surrounding duty of oversight.
Read More
Discord social network logo on a smartphone showing hacked Discord bot impacted NFT projects
Cyber SecurityNews

Multiple NFT Projects Attacked After Commonly-Used “Mee6” Discord Bot Hacked

May 23, 2022
Mee6 is a very popular Discord bot that automates a wide variety of functions. A compromise led to an assortment of associated NFT services seeing spam and hacking attempts.
Read More
Roblox game on smartphone showing trojan code in Synapse X
Cyber SecurityNews

Hackers Compromised Synapse X Scripting Engine To Inject Trojan Code Into Roblox Game

May 23, 2022
Hackers injected trojan code into the Roblox scripts by compromising the Synapse X engine, allowing them to install DLL libraries capable of breaking applications and destroying data.
Read More
Man typing on laptop with login and lock showing privileged access management
Cyber SecurityInsights

Why Fortune 1000 Organizations Aren’t Thinking About Privileged Access Management the Right Way

May 24, 2022
With the current emphasis on Zero Trust, Fortune 1000 organizations should start looking beyond their Privileged Access Management (PAM) solutions to properly manage their privilege sprawl. The strategy is ‘Zero Standing Privilege,’ (ZSP).
Read More
1 … 155 156 157 158 159 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results