CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Selective focus on keyboard with magnifier searching concept in dark low key night tone
Cyber SecurityInsights

Importance of Using SIEM for GDPR Compliance

May 24, 2018
A Security Information and Event Management (SIEM) can play an important role in GDPR compliance. It can serve as a centralized point for all data collection and analysis, and offer intelligent insights into malicious behavior so you can be alerted of security incidents before they become an impactful data breach.
Read More
Recognition of a female face by layering a mesh and the calculation of the personal data by the software
Cyber SecurityInsights

Love Affair with Facial Recognition Software: What Are the Cybersecurity Risks?

May 23, 2018
Is facial recognition software secure by design? A question rarely asked is “how safe is the infrastructure that holds and processes all this data?” As long as organizations refuse to audit the security of their suppliers, facial recognition software will remain inherently unsafe, especially in the hands of the police.
Read More
Image of great leadership instead of analyst firms in a boardroom making cyber security decisions
Cyber SecurityInsights

What Analyst Firms Won’t Tell You: Great Leadership Drives the Best Cyber Security Decisions

May 18, 2018
Making educated decisions about cyber security requires high-quality information. Analyst firms are happy to provide information. But is the information they provide genuinely useful? Are they adding value to the conversation? Ultimately, great leadership, thoughtful strategy and superior execution is key to success.
Read More
Image of cybersecurity threat lurking and peering over the four walls of the workplace
Cyber SecurityInsights

Cybersecurity: Beyond the Four Walls of the Workplace

May 11, 2018
By now, it’s safe to assume that everyone’s personal information has been compromised in some way. The digital nature of our world come with risks and since the cyberthreats facing us all extend beyond the four walls of the workplace, so should our cybersecurity efforts.
Read More
Image of man typing on laptop and sending data to cloud service providers which is protecting data
Cyber SecurityInsights

Protecting Data in 2018: What Cloud Service Providers and Customers Should Know

May 10, 2018
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs.
Read More
Image of chains of bits signifying blockchain and the future of how the technology will be the new antivirus
Cyber SecurityInsights

Blockchain is the Future of Antivirus

May 7, 2018
There is an obvious problem with how we approach cyber security. But blockchain may enable a single marketplace of enterprises, consumers, vendors and geographically-diverse security experts to help revise the hiring model, make cyber security more efficient, and decrease the impact of malicious attacks globally.
Read More
Image of woman explaining contract document in front of laptop to two men showing how there are lurking pitfalls in the blockchain contract era
Cyber SecurityInsights

Lurking Pitfalls for the Unwary in the Blockchain Contract Era

April 26, 2018
Both governments and companies are shepherding the application of blockchain technology across various industries, and of particular interest is how the technology will usher in an era of blockchain contracts. While the blockchain holds promise, there are legal concerns beyond the technological benefits and challenges.
Read More
Image of man holding spanners above a toolbox signifying the must-have security tools for achieving GDPR compliance
Cyber SecurityInsights

A Guide to the Must-Have Security Tools for GDPR Compliance

April 23, 2018
GDPR requires a comprehensive approach to information security, compliance, governance and risk. Even though security tools are just one piece of the GDPR compliance puzzle, they are an important aspect of protecting consumer data privacy. What are the eight must-have security tools for maintaining GDPR compliance?
Read More
Image of man wearing a tie in front of microphones doing a media interview on data breaches for Under Armour and Panera Bread
Cyber SecurityInsights

A Tale of Two Data Breaches – Under Armour and Panera Bread

April 19, 2018
Recent data breaches at Under Armour and Panera Bread has been making headlines. But the approach taken to mitigate the threat to consumers could not have been more different. One is a lesson on best practice and the other is a cautionary tale on how not to handle malicious attacks aimed at seizing consumer data.
Read More
Image of hand putting CD in the tray of a laptop signifying the difficulty to know where your data is
Cyber SecurityInsights

It’s 2018, Do You Know Where Your Data Is?

April 16, 2018
Anyone dealing with critical information should pay attention to the data they handle, how they are accessing it, and where it originated. The idea is to maintain the integrity of the data and the chain of custody, which is a concept that involves the strict ownership and control over the item in question.
Read More
1 … 198 199 200 201 202 … 208

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results