CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Developers writing code showing secure applications and API security
Cyber SecurityInsights

Consumers Understand the Implications of and Are Willing To Pay For Secure Software

May 27, 2022
APIs power the digital experiences of consumers today. However, as API use increases, so do security risks because APIs are easy to deploy but hard to control.
Read More
Hand touching screen of smartphone showing cyber defense
Cyber SecurityInsights

5 Ways Enterprises Can Protect Their Data, Time, Money, and Infrastructure

May 26, 2022
With heavy interference by law enforcement, there has been an anticipated shift from critical infrastructure cyberattacks to corporate enterprise companies. The enterprise attack surface, which is the sum of all entry and exit points, is massive.
Read More
Cyber SecurityInsights

New Data Shows Compliance Falls Short of Protecting Your Organization

May 26, 2022
New report showing individual compliance regulations and their propensity to allow breached passwords into the fold – up to 83% of known breached passwords can satisfy regulatory compliance standards.
Read More
Young man looking at laptop computer in the dark showing Great Resignation increased risks of intellectual property theft
Cyber SecurityInsights

How To Protect Company IP During the Great Resignation

May 25, 2022
The Great Resignation is currently taking center stage. This massive employment shift leaves a huge opening for increased incidents of insider risk and intellectual property theft and should be of extreme concern for both security leaders and practitioners.
Read More
Man typing on laptop with login and lock showing privileged access management
Cyber SecurityInsights

Why Fortune 1000 Organizations Aren’t Thinking About Privileged Access Management the Right Way

May 24, 2022
With the current emphasis on Zero Trust, Fortune 1000 organizations should start looking beyond their Privileged Access Management (PAM) solutions to properly manage their privilege sprawl. The strategy is ‘Zero Standing Privilege,’ (ZSP).
Read More
Board members sits at a table in a meeting room showing personal liability
Cyber SecurityInsights

Personal Liability for Directors Who Disregard Cybersecurity

May 23, 2022
Trend has begun to emerge for cybersecurity incident-related shareholder derivative lawsuits – attorneys are increasingly now filing claims specifically based on failures surrounding duty of oversight.
Read More
USA map on digital display showing privacy regulations
Data ProtectionInsights

Data Privacy Conundrum: When Different States Play by Different Rules. . .

May 20, 2022
By 2024, it’s likely that almost every U.S. state will have its own data privacy regulations. Businesses getting prepared now are barely ahead of the curve; those that put it off till the laws hit the market will have to scramble to keep up.
Read More
Digital world and data transmission on laptop showing digital transformation and data strategy
Cyber SecurityInsights

DX 2.0 Demands a Sustainable and Secure Data Strategy

May 19, 2022
A sustainable data strategy focuses on good data rather than big data. With good data at the nucleus of DX efforts, a clear data strategy can support growth catalysis within the business and among its employees, empowering customers and other stakeholders.
Read More
Woman in front of modern graphic interface showing data ecosystem and data governance
Cyber SecurityInsights

How the Modern Data Ecosystem Broke Data Governance

May 18, 2022
Technologies have helped creating a comprehensive modern data ecosystem deliver data value easier and faster may have made data governance and protection appear more difficult.
Read More
Data center computer racks showing machine identities
Cyber SecurityInsights

Just How Risky Are Your Machine Identities?

May 17, 2022
As the number of machines grows to the tens of billions, security needs to catch up to this rapid growth with the intelligence and automation necessary to manage thee machine identities of these critical security assets.
Read More
1 2 3 … 102

Latest

Close up of hacker hand stealing data from digital tablet showing DBIR data breach report

Verizon 2022 DBIR: 4 of 5 Data Breaches Caused by “Human Element,” Business Partners Involved in 3 of 5

Side view of laptop on desktop with digital emails showing accidental data loss

Nearly 60% Of Organizations Suffered Accidental Data Loss via Email in Last 12 Months

Developers writing code showing secure applications and API security

Consumers Understand the Implications of and Are Willing To Pay For Secure Software

Hand taking dollar from pile illuminated by red light showing ransomware attacks down due to ransom payments

NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results