CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Microsoft logo at headquarters showing Mirai botnet exploiting Azure vulnerability
Cyber SecurityNews

Mirai Botnet Trojans Actively Exploiting Microsoft Azure Vulnerability and Locking Other Hackers Out

September 24, 2021
Security researchers discovered that Mirai Botnet trojans actively exploited the OMIGOD Azure vulnerability and then closed the OMI SSL port 5896 to prevent others from doing the same.
Read More
Image of robot army representing an Android botnet
Cyber SecurityNews

Are You Unknowingly Part of an Android Botnet?

September 2, 2017
Last week, Google announced the removal of around 300 Android apps found with malware that secretly hijacks your phone to...
Read More
Waves wash away sand castles on the beach showing how businesses have trouble achieving cyber resilience
Cyber SecurityNews

Only Half of Businesses Believe They Have Achieved Cyber Resilience

April 20, 2019
A new study from Tanium indicates that businesses overwhelmingly believe that cyber resilience and business resilience is fundamental, but have a great deal of trouble achieving it.
Read More
Image of hacker laughing representing not letting a good data breach go to waste
Cyber SecurityInsights

Never Let a Good Data Breach Go To Waste

November 22, 2017
If a massive data breach has been in the news recently – such as the Equifax data breach that impacted more than 143 million Americans – there’s a good chance that other hackers will capitalize on this public data breach to cause greater harm to victims, and open up those already victimized to even more risk.
Read More
Hard disk file locked by chain and padlock with binary ransomware on laptop monitor showing ransomware payments
Cyber SecurityNews

Big Tech and Government Agencies Collaborate To Put an End to Ransomware Payments

May 11, 2021
A "Ransomware Task Force" initiative led by the U.S. Department of Justice is including a broad coalition of big tech firms, as well as Europol and the UK National Crime Agency, in an effort to put an end to ransomware payments.
Read More
Hacker working on computer showing rise in digital fraud
Cyber SecurityNews

Digital Fraud Jumps Dramatically Due to COVID-19 Pandemic, Increased E-Commerce and Digital Banking Traffic

February 2, 2021
While one might reasonably infer on their own that digital fraud is on the rise, a new report from fraud detection firm DataVisor breaks down the current trends and finds a confluence of causes.
Read More
Hacker typing on keyboard with floating virtual lock showing Russian hackers targeting tech supply chain
Cyber SecurityNews

Microsoft Reports Russian Hackers Behind SolarWinds Attack Actively Targeting Tech Supply Chains, Focusing on Vulnerable Resellers

October 29, 2021
Microsoft reported that the Russian hackers behind the devastating SolarWinds attack are employing similar tactics to worm their way into tech supply chains, looking to establish long-term footholds for espionage purposes.
Read More
Man showing thumbs up sign for desired skills for cyber security jobs
Cyber SecurityNews

Most Desired Skills, Programming Languages, and Professional Certifications for Cyber Security Jobs

October 30, 2020
Technical ability and mindset, Python coding language, and the CISSP certification are among the most desired skills for cyber security jobs, SpecOps' study found.
Read More
Substation with power lines and transformers showing cybersecurity professionals’ concerns on state of ICS security
Cyber SecurityNews

Tripwire Report Surveys Cybersecurity Professionals On State of ICS Security

October 21, 2019
Recent Tripwire survey reported 93% of cybersecurity professionals are concerned over ICS security and how potential cyber attacks could shut down operations or lead to customer-impacting downtime.
Read More
Cloud computing technology and online data storage above globe showing cloud security when going cloud native
Cyber SecurityInsights

Cloud Workloads: How To Manage Complexity and Increase Security When Going Cloud-Native

April 27, 2021
In many ways, the benefit of cloud computing is also its main drawback. How can organizations keep their IT environments secure while leveraging the full benefits of a cloud-native approach?
Read More
1 … 155 156 157 158 159 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results