CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Yodel delivery Service logo sign showing cyber incident suspected ransomware
Cyber SecurityNews

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

July 1, 2022
Yodel parcel delivery service confirmed that it suffered a cyber incident that disrupted distribution operations leaving customers unable to track orders or reach customer support.
Read More
Hacker working on vulnerabilities
Cyber Security

Report: 62% Of Companies Take 48 Hours or Longer to Remediate Vulnerabilities To Patch Known Critical Vulnerabilities

July 4, 2022
NopSec has released the findings from their State of Vulnerability Management report surveying 426 CISOs, information security managers, analysts, pen testers, and other security professionals.
Read More
Hacker hunting for crypto showing cyber attacks
Cyber SecurityInsights

Fighting Back: Emergent Technologies To Secure Crypto Firms Against Cyberattacks

July 4, 2022
A strong recovery and resilience strategy will ensure that crypto and DeFi firms are able to rebound from cyber attacks with minimal disruptions to their operations, mitigating losses for their investors and users.
Read More
Doctor with stethoscope and medical icons showing clinical cybersecurity for healthcare
Cyber SecurityInsights

Four Steps To Robust Clinical Cybersecurity

July 5, 2022
Having a robust approach to cyber hygiene in healthcare organizations not only improves clinical cybersecurity and the efficiency of clinical operations, it also ultimately improves patient safety and privacy.
Read More
Logo of AMD on CPU fan showing cyber extortion gang data breach
Cyber SecurityNews

AMD Investigating Data Breach by RansomHouse Cyber Extortion Group

July 5, 2022
AMD said it was investigating a data breach by the RansomHouse cyber extortion group claiming to have stolen 450 GB of data by exploiting weak passwords used by the chipmaker's employees.
Read More
Male hacker hand on laptop computer keyboard with red binary screen showing LockBit ransomware bug bounty program for ransomware-as-a-service
Cyber SecurityNews

Corporatization of Ransomware Industry Continues as LockBit “Ransomware-as-a-Service” Gang Offers Bug Bounty Program

July 5, 2022
The LockBit gang is the latest ransomware-as-a-service outfit to push the envelope, this time by offering the criminal underworld's first known bug bounty program.
Read More
Man pointing at lock security icons showing fraud prevention and identity verification
Cyber SecurityInsights

To Outsmart the New Generation of Fraudsters, a Holistic Fraud Prevention Approach Is Needed

July 6, 2022
Fraud is becoming more personalized. The risks of not prioritizing identity verification for fraud prevention are significant — damaged brand reputation and consumer trust, compliance-related fines and significant financial repercussions.
Read More
China citizens on the streets of Shanghai showing data leak of personal data
Cyber SecurityNews

Data Leak May Have Exposed Sensitive Information of 1 Billion China Citizens; Hacker Offers 23 TB of Personal Data on Underground Forum

July 6, 2022
The personal data of 1 billion China citizens, or about two-thirds of the country's entire population, appears to be available for sale on an underground forum after a data leak.
Read More
Businessman standing while holding an umbrella showing cyber insurance based on attack surface EASM
Cyber SecurityInsights

How Are Cyber Insurance Premiums Calculated? It’s Complicated, but EASM Can Provide Clarity

July 7, 2022
Factoring External Attack Surface Management (EASM) into the equation means the math is clear for all. Insurance companies can better justify premium prices, while companies can demonstrate their cyber posture when applying for cybersecurity insurance.
Read More
Close-up view of browsing the NFT marketplace in OpenSea showing third-party data breach
Cyber SecurityNews

Largest NFT Marketplace OpenSea Suffers a Third-Party Data Breach

July 7, 2022
NFT marketplace OpenSea acknowledged a data breach after an employee of a third-party email delivery vendor downloaded email addresses and shared them with an unauthorized party.
Read More
1 … 163 164 165 166 167 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results