CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Executives discussing cybersecurity defenses
Cyber SecurityInsights

Getting Defensive: Expert Advice on Cybersecurity

July 2, 2018
CPO Magazine sat down with Prashant Pai and Scott Stransky at Verisk to understand what companies should consider when shoring their cybersecurity defenses.
Read More
Hacker stealing crytocurrency from computer screen representing Coinhive
Cyber SecurityNews

Latest Coinrail $40M Heist Shows Need for Security and Cryptocurrency Regulations

June 27, 2018
As might be expected, the scale and scope of the latest Coinrail cyber heist has increased the call for new cryptocurrency regulations for both exchanges and trading, and could go a long way in maintaining investor faith in the modern financial system.
Read More
Image of hammer and gavel in front of computer screen as cyber crime legal law concept
Cyber SecurityInsights

Recovering Data Breach Losses from Non-Contractual Parties

June 22, 2018
The ability of financial institutions to recover data breach losses from non-contacting parties depends on various legal statutes and industry regulations.
Read More
Rear View Of A Hacker Using Multiple Computers
Cyber SecurityNews

New Government Reports Shows Federal Agencies Facing Significant Cyber Security Risks

June 18, 2018
New report shows nearly 75 percent of U.S. federal agencies are still woefully unprepared and deemed to be “at risk” or “at high risk” of a cyber attack.
Read More
Young beautiful female sitting in modern urban cafe drinking cappuccino and paying with credit card for online shopping on laptop
Cyber SecurityInsights

Reducing the Impact of New Account and Credit Card Fraud on Financial Institutions

June 1, 2018
Increased credit card usage has resulted in higher rates of credit card fraud, and financial institutions are bearing the brunt of the financial losses. Recently, fraudsters are committing synthetic identity fraud by cultivating identities and developing credit histories over time leading to the call for new solutions.
Read More
Selective focus on keyboard with magnifier searching concept in dark low key night tone
Cyber SecurityInsights

Importance of Using SIEM for GDPR Compliance

May 24, 2018
A Security Information and Event Management (SIEM) can play an important role in GDPR compliance. It can serve as a centralized point for all data collection and analysis, and offer intelligent insights into malicious behavior so you can be alerted of security incidents before they become an impactful data breach.
Read More
Recognition of a female face by layering a mesh and the calculation of the personal data by the software
Cyber SecurityInsights

Love Affair with Facial Recognition Software: What Are the Cybersecurity Risks?

May 23, 2018
Is facial recognition software secure by design? A question rarely asked is “how safe is the infrastructure that holds and processes all this data?” As long as organizations refuse to audit the security of their suppliers, facial recognition software will remain inherently unsafe, especially in the hands of the police.
Read More
Image of great leadership instead of analyst firms in a boardroom making cyber security decisions
Cyber SecurityInsights

What Analyst Firms Won’t Tell You: Great Leadership Drives the Best Cyber Security Decisions

May 18, 2018
Making educated decisions about cyber security requires high-quality information. Analyst firms are happy to provide information. But is the information they provide genuinely useful? Are they adding value to the conversation? Ultimately, great leadership, thoughtful strategy and superior execution is key to success.
Read More
Image of cybersecurity threat lurking and peering over the four walls of the workplace
Cyber SecurityInsights

Cybersecurity: Beyond the Four Walls of the Workplace

May 11, 2018
By now, it’s safe to assume that everyone’s personal information has been compromised in some way. The digital nature of our world come with risks and since the cyberthreats facing us all extend beyond the four walls of the workplace, so should our cybersecurity efforts.
Read More
Image of man typing on laptop and sending data to cloud service providers which is protecting data
Cyber SecurityInsights

Protecting Data in 2018: What Cloud Service Providers and Customers Should Know

May 10, 2018
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs.
Read More
1 … 277 278 279 280 281 … 287

Latest

Aerial view of factory showing hackers cyber attack on critical infrastructure

CISA Warns About Unsophisticated Hackers Compromising U.S. Critical Infrastructure

Access granted screen on monitor showing data breach

Education Giant Pearson Confirms Customer Data Breach After Cyber Attack

Mechanical bug on keyboard showing vulnerability database

EU Launches Government-Backed Vulnerability Database as CVE Alternative

Stack of golden Monero coins showing ban on privacy coins and anonymous crypto accounts

EU Looks to Ban Privacy Coins and Anonymous Crypto Accounts by 2027

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results