CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

IoT showing smart information and supply chains
Cyber SecurityInsights

Securing Entire Supply-Chains in Preparation for an IoT Future

May 13, 2022
The importance of creating an interconnected security infrastructure for IoT is crucial. In a world where everything is communicating with everything else it is not just business critical but vital that everything from smart city networks down to individual smart devices is secure.
Read More
Man holding unlocked lock showing vulnerability management program
Cyber SecurityInsights

Keep Your Network Safe: Why Every Organization Needs a Vulnerability Management Program

May 12, 2022
Every organization needs a vulnerability management program in today’s high-risk environment. Learn how these programs work and how they prevent cyber attacks.
Read More
Team of employees celebrating showing cybersecurity teams and culture
Cyber SecurityInsights

Make Cybersecurity a Way of Life at Your Organization

May 10, 2022
Cybersecurity practices are most effective when they are integrated as a way of life for employees, rather than a once-a-year IT requirement.
Read More
Microphones from news agencies at a press conference showing responsible disclosure for data breach
Cyber SecurityInsights

Full Disclosure Is the Right Thing To Do. Full Stop.

May 9, 2022
Security incidents happen; that’s just reality. But how a company decides to handle an event says more about their values and priorities than their product. The recent Okta compromise reminds us of the damage inflicted when there is a lack of transparency between a security vendor and its customers.
Read More
Software developer working on laptop showing protestware and software supply chain
Cyber SecurityInsights

Organizations, Beware: Protect Against Protestware

May 6, 2022
The term protestware recently made global news when organizations in Russia and Belarus were attacked by malicious code that wiped their computers’ files. This malware was distributed through the popular open source JavaScript library, node-ipc, and was introduced by its maintainer in retaliation for Russia's invasion of Ukraine.
Read More
Staff in security operations center (SOC)
Cyber SecurityInsights

Chicken or the Egg? Setting up a Successful SOC Happens Before Hiring

May 5, 2022
With an immediate need to remedy the headcount shortage in cybersecurity, staffing a security operations center (SOC) is only half the battle though. We need to focus on cultivating our workplace culture to better retain talent.
Read More
Closeup of an empty conference room before board meeting meeting showing data breaches litigations
Cyber SecurityInsights

Avoiding Data Breaches: A Guide for Boards and C-Suites

May 4, 2022
Litigation against corporate board members and C-level executives for data privacy and security claims is on the rise. Recently, plaintiffs have targeted corporate board members and C-level executives alleging that their data privacy–related claims result from a breach of fiduciary duties.
Read More
Close up on the screen focus on the browser padlock showing digital certificates and certificate authority
Cyber SecurityInsights

How Russia’s New Certificate Authority Could Change the Internet in America

May 3, 2022
By owning a trusted CA, Russia can also now host as many man-in-the-middle attacks, which are generally privacy attacks. Additionally, state-sponsored hacking groups can produce certificates for devices meant to intercept traffic and view all of the encrypted communications.
Read More
Many small network connected to a larger network showing federated learning and privacy enhancing technologies
Data PrivacyInsights

What Privacy Professionals Need To Know Before Investing in Federated Learning

May 2, 2022
Emerging privacy enhancing technologies (PETs), such as federated learning, are the key building blocks in changing our relationship with data. They can unlock new opportunities while protecting individual privacy, maintaining control of valuable data, and simplifying compliance in an increasingly fragmented regulatory landscape.
Read More
Developers writing code showing API vulnerabilities
Cyber SecurityInsights

Common API Vulnerabilities: What You Need To Know

April 29, 2022
APIs are the backbone of numerous popular web services because of their utility, ubiquity, and increasing architectural choices. Regardless of the API architecture chosen, there are shared factors that make them all vulnerable.
Read More
1 2 3 … 101

Latest

NHS logo with heart silhouette showing email accounts used for phishing campaign

Legitimate NHS Email Accounts Exploited in Credential Harvesting Phishing Campaign and Advance-Fee Scams

Malware symbol showing Russian hackers phishing campaign

Phishing Campaign by Russian Hackers Uses Trello, Dropbox to Target Diplomats

IoT showing smart information and supply chains

Securing Entire Supply-Chains in Preparation for an IoT Future

Steel long pipes in crude oil factory during sunset showing Colonial Pipeline ransomware attack

Colonial Pipeline May Face $1 Million Penalty for “Operational” Lapses in 2021 Ransomware Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results