CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Entrance to the FBI building showing cyber crime report
Cyber SecurityNews

FBI Annual Internet Crime Report Finds Hot New Trend in Online Scams: “Pig Butchering”

March 21, 2023
Investment scams that involve grooming a target to invest in fraudulent endeavors took off like a rocket in 2022 and led all cyber crime, racking up $3.3 billion in losses on the year.
Read More
Closeup of a Falcon 9 booster rocket at SpaceX showing LockBit ransomware breached third party vendor
Cyber SecurityNews

SpaceX Third Party Vendor Hit by LockBit Ransomware, Gang Claims That It Stole Engineering Schematics

March 20, 2023
The LockBit ransomware group claims that it was able to penetrate SpaceX via a third party vendor, and is holding some 3,000 engineering design documents that it is threatening to sell.
Read More
Image of team working together on cybersecurity framdworks for privacy regulations
Cyber SecurityInsights

Meet Data Privacy Mandates With Cybersecurity Frameworks

March 20, 2023
Many data-centric cybersecurity frameworks are pushing the industry towards full proactive prioritization and risk ranking gap analysis to enable an accurate measure of system risk while reducing the resources and time required for compliance with privacy regulations.
Read More
Hand holding Amazon's Ring video doorbell showing ransomware gang data breach
Cyber SecurityNews

Ransomware Gang Threatens Amazon’s Ring With Data Leak

March 17, 2023
The ransomware gang ALPHV has claimed to have breached Amazon's Ring on the underground site it uses to extort victims, though it has yet to provide any evidence.
Read More
Businessman touch a virtual screen to unlock and access information showing identity management and access control
Cyber SecurityInsights

Mastering Authorization in Modern and Dynamic Environments

March 17, 2023
Cloud and mobility, including the blurred lines between personal and corporate devices has increased the complexity of identity and access management. Likewise, the surge in the sheer volume and variety of data has contributed to a more dynamic and multifaceted authorization process for enterprises.
Read More
AT&T building showing third party data breach
Cyber SecurityNews

AT&T Confirms Third-Party Data Breach Exposing 9 Million Customer Accounts

March 16, 2023
Telecoms giant AT&T confirmed a third-party data breach involving a marketing vendor exposing 9 million customer accounts to unauthorized access.
Read More
View of Acer building showing stolen data from data breach on hacking forum
Cyber SecurityNews

Acer Confirms Data Breach After Hacker Lists Stolen Data on Hacking Forum

March 16, 2023
Taiwanese PC maker Acer confirmed a data breach after a hacker listed the stolen data on a hacking forum, including technical product specifications and infrastructure details.
Read More
Aerial view of LPG tanker at crude oil terminal showing ransomware gangs and critical infrastructure
Cyber SecurityInsights

Cybersecurity: When Best Intentions Fall Short of the Threat Reality

March 15, 2023
Cybercriminals aren’t just hacking for activism or for fun. They’re running their attacks like a business, targeting organisations to extort money – and they’re getting smarter at it. Don’t get complacent, don’t cut corners and shore yourself up against the people lurking in the cyber-shadows.
Read More
Capitol in Washington at night showing health data breach affecting members of Congress
Cyber SecurityNews

Health Data Breach Exposes Members of Congress, 170K Records Offered on Underground Forum

March 13, 2023
A health data breach appears to have exposed the sensitive personal information of members of Congress and their employees. DC Health Link is used by many (but not all) members and their assorted staff.
Read More
Aircraft at the gate at JFK International Airport showing TSA cybersecurity requirements for aviation sector
Cyber SecurityNews

TSA Lays Out New Cybersecurity Requirements for Aviation Sector

March 13, 2023
The U.S. aviation sector is looking at new cybersecurity requirements in four fundamental areas: network segmentation and redundancy, access control, monitoring and detection of threats, and timely patching.
Read More
1 2 3 4 5 … 208

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results