CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Image of man using laptop with lock on the screen representing the web security upgrade needed for U.S. federal websites
Cyber SecurityNews

U.S. Federal Websites in Urgent Need of Web Security Upgrade

December 8, 2017
The U.S. Federal Government is a behemoth that touches every aspect of American life – and today the services and information needed by U.S. citizens are increasingly found online. However, the latest report on the state of U.S. federal websites indicates that they fail on some key indicators regarding web security.
Read More
Image of umbrella in the rain representing cyber insurance for public sector agencies
Cyber SecurityInsights

Cyber Insurance Now Critical for Public Sector Agencies?

November 29, 2017
The private sector is increasingly turning to cyber insurance to at least mitigate some of the effects of hacking, however governments across the globe seem to have been slow to take advantage. Given the severity of the cyber threats, is it time for public sector agencies to leverage cyber insurance offerings?
Read More
Image of cars in a traffic jam representing uber breach and how consumers will ever learn or care
Cyber SecurityInsights

Uber Breach: Will They Ever Learn and Will Consumers Ever Care?

November 27, 2017
The Uber breach that affected 57 million people shows the near complete lack of care at the company with regard to customer data – as well as the company’s inability to learn from previous security mishaps. Are customers already desensitized after hearing data breach after data breach or will this be a wake-up call?
Read More
Image of multiple screens representing internet surveillance from Pentagon's leaked database
Cyber SecurityNews

Pentagon’s Leaked Database Reveals Extent of Internet Surveillance

November 24, 2017
Misconfigured AWS buckets containing dozens of terabytes worth of social media messages were exposed to the public. The data found in Pentagon's leaked database was gathered by the U.S. military as part of their ongoing efforts to identify so called ‘persons of interest’, revealing the extent of internet surveillance.
Read More
Image of hacker laughing representing not letting a good data breach go to waste
Cyber SecurityInsights

Never Let a Good Data Breach Go To Waste

November 22, 2017
If a massive data breach has been in the news recently – such as the Equifax data breach that impacted more than 143 million Americans – there’s a good chance that other hackers will capitalize on this public data breach to cause greater harm to victims, and open up those already victimized to even more risk.
Read More
Image showing rows of data tapes representing U.S. government revealing vulnerabilities equities process
Cyber SecurityNews

U.S. Government Opens Up Vulnerabilities Equities Process, Problem Solved?

November 21, 2017
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.
Read More
Image of hacker taking data from mobile phone representing how malware like fake WhatsApp and Lovelly Wallpaper begs the question of whether the Play Store can still be trusted
Cyber SecurityInsights

Fake WhatsApp, Lovely Wallpaper … Can the Play Store Still be Trusted?

November 20, 2017
With the Play Store distributing malicious apps like fake WhatsApp and malware, is downloading only from trusted Android stores still a relevant approach?
Read More
Image of open sign on window representing how the dark web selling remote access to corporate PCs
Cyber SecurityNews

Dark Web Offers Bargain Prices for Remote Access to Corporate PCs

November 16, 2017
Rock bottom prices on the dark web for remote access into corporate PCs a boon for cyber criminals to steal data, distribute malware and ransomware attacks.
Read More
Image of U.S. capitol with dark clouds signifying how hackers are helping to secure voting machines
Cyber SecurityNews

Hackers to Help Make Voting Machines Safe Again

November 15, 2017
Fear of Russian hackers infiltrating voting machines in the last U.S. presidential election has led to a new bill to enlist hackers to find vulnerabilities.
Read More
Image of confused and worried man using mobile phone signifying questions for Apple's Face ID security feature
Cyber SecurityInsights

How Effective is Apple’s New Face ID Security Feature?

November 14, 2017
We look at the ease of use, reliability and strength of Apple's iPhone X new Face ID security feature. Should you keep your face (password) to yourself?
Read More
1 … 281 282 283 284 285 … 287

Latest

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results