CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

CPU processor socket on a computer motherboard showing the Intel chip vulnerability that impacts five years worth of computers
Cyber SecurityNews

“Unfixable” Intel Chip Vulnerability Could Undermine Encryption on Five Years Worth of Computers, But Is a Difficult Attack to Pull Off

March 16, 2020
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system.
Read More
Tired security analysts in front of monitors showing alert fatigue for cloud security
Cyber SecurityNews

“Alert Fatigue” Becoming Serious Issue for Cloud Security Teams as Half of Organizations Missed Critical Alerts

March 22, 2022
The sheer number of reports that cloud security teams deal with are becoming a serious problem, and "alert fatigue" is causing critical alerts to be missed at an alarming rate.
Read More
Clubhouse application icon on smartphone showing Clubhouse and Facebook users phishing and account takeover attacks
Cyber SecurityNews

“Combo File” Merging 3.8 Billion Phone Numbers from Clubhouse With Scraped Facebook Users Could Cause Surge in Phishing, Account Takeover Attacks

October 1, 2021
A new "combination file" offered on the dark web that makes connections between Clubhouse and Facebook users is a threat to create a spike in specific attack types, namely phishing and account takeover attempts.
Read More
Image of confused man sitting in front of computer about to type signifying insider threats within the organization
Cyber SecurityInsights

“Real” Insider Threats Already Lurking Within Your Organization

February 28, 2018
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
Read More
Window of the multi-story building showing how secure facilities face RF security threats
Cyber SecurityInsights

“Some Devices Allowed” – Secure Facilities Face New RF Threats

August 27, 2020
RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that require more nuanced electronic device policies.
Read More
Electronic devices waste ready for recycling showing data security in asset disposal
Cyber SecurityInsights

“Trust Me” – Taking a Zero-Risk Human-Centered Approach to Data Security

November 11, 2021
For IT asset disposition (ITAD), data safety and destruction isn’t just a technological issue, it’s a human one as well – based on procedure and trust. So how do we build a more trustworthy process?
Read More
Hooded hacker stealing data from laptop showing data breach at Washington State Auditor which impacts unemployment claimants and may result in identity theft
Cyber SecurityNews

1.6 Million Washington State Unemployment Claimants Have Financial Information Exposed in Hack of State Auditor’s Office

February 9, 2021
1.6 million unemployment claimants in Washington may have just received an identity theft headache. A hack of the State Auditor's office has exposed extremely sensitive personal information.
Read More
Businessman holding technology icon showing cloud security
Cyber SecurityInsights

10 Ways to Quickly Improve Security for Your AWS Environment

October 15, 2021
For enterprises, getting up to speed with cloud deployments, migrations, and protecting their cloud infrastructure in time and cost-efficient ways is more important now more than ever.
Read More
Google Gmail webpage under magnifying glass showing USB security key giveaway
Cyber SecurityNews

10,000 “High Risk” Targets of Nation-State Hacking Groups Get USB Security Keys From Google

October 14, 2021
Google's Threat Analysis Group has announced it is providing free USB security keys to a collection of politicians, activists and other high-risk individuals likely to be targeted by nation-state hackers.
Read More
Man holding Samsung phone with virtual lock showing encryption
Cyber SecurityNews

100 Million Samsung Phones Shipped With Flawed Encryption; Galaxy S8 to S21 Series Cryptographic Keys “Trivial” To Expose

March 2, 2022
Encryption vulnerability renders Samsung phones in the Galaxy line from 2017 to 2021 completely insecure, at least until they are updated to security patches from July 2021 and beyond.
Read More
1 2 3 4 … 157

Latest

Board members sits at a table in a meeting room showing personal liability

Personal Liability for Directors Who Disregard Cybersecurity

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results