CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Close up of cyber criminal hacking and cyber attacks
Cyber SecurityNews

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

June 23, 2022
67% of businesses suffered subsequent cyber attacks within a year after the first incident, with 10% recording ten or more repeated breaches. Medium-sized firms were most impacted.
Read More
Man typing on keyboard laptop showing ID verification and digital identity
Cyber SecurityNews

80% Of Consumers Prefer Brands With Robust ID Verification Measures, a Global Digital Identity Survey Found

June 3, 2022
8 of 10 consumers prefer transacting with online brands having strong ID verification measures with 68% preferring digital identity use in the financial services sector.
Read More
Businessman typing on keyboard to input username and password showing authentication methods for financial institutions
Cyber SecurityNews

80% of Financial Institutions Had a Breach Due to Legacy Authentication Methods, but Most Refuse to Upgrade

July 28, 2022
Researchers found that although 80% of financial institutions suffered data breaches per year from vulnerabilities in their authentication methods, 64% refused to upgrade.
Read More
Hacker hand stealing data from laptop showing threat of cyber espionage
Cyber SecurityNews

85% of Cyber Espionage Is State-Affiliated, Only 4% Tied To Organized Crime

November 27, 2020
Among the major highlights of the Verizon Cyber Espionage Report: criminal organizations and former employees play a trivial role in overall attempts, the overwhelming majority come from states.
Read More
Woman using laptop at home showing the nine security hacks to protect remote workers
Cyber SecurityInsights

9 Security Hacks for Protecting Remote Workers

July 2, 2020
Remote workers executing their tasks through both company-issue and personal devices have become a new normal. What are the nine security hacks that can keep them from being vulnerable?
Read More
Programming codes on laptop screen showing 98% of top U.S. websites are susceptible to client-side attacks
Cyber SecurityNews

98 Percent of Top US Websites Susceptible to Client-Side Attacks

December 2, 2019
98% of top 1,000 U.S. websites were reported to be inadequately secured against client-side attacks which raise significant alarm bells about the current state of modern web architecture.
Read More
Developers working together showing DevSecOps and threat modeling
Cyber SecurityInsights

A Case for Modernizing Threat Modeling in 2022

June 22, 2022
More recent approaches to threat modeling is including DevSecOps, putting a greater focus on developers as a critical arm of cybersecurity. Additionally, threat modeling is pulling away from a reliance on security professionals looking at finished products, instead asking engineering to embrace the concept of security as code.
Read More
Side view of man doing remote work on computer showing compliance blueprint
Cyber SecurityInsights

A Compliance Blueprint for the FCA’s Remote Work Expectations

December 9, 2021
FCA issued remote work guidance in October outlining its expectations for compliance with its regulatory framework and effectively signaling the end of any reprieve for dispersed workforces.
Read More
Blur motion moving train showing cybersecurity trends
Cyber SecurityInsights

A Cybersecurity Arms Race: Trends and Developments to Understand for 2022

December 22, 2021
We are living in the middle of an arms race in cybersecurity. Adversaries are leading the way, while the good guys reconfigure and retool, and the cycle continues. What does the crystal ball look like for the cybersecurity and risk management world of 2022?
Read More
Stock market chart on blue background showing demand for cybersecurity training
Cyber SecurityInsights

A Digital New Deal: How Can We Tackle the Worst Economy Since the Great Depression?

March 4, 2021
As part of a Digital New Deal, cybersecurity bootcamps will play a pivotal role in improving the earning potential of professionals in a space that is desperately looking to fill roles.
Read More
1 … 5 6 7 8 9 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results