CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Visual of smart digital city showing Big Tech's privacy push
Data PrivacyInsights

“Better, but Still Not Good” – Making Sense of Big Tech’s Privacy Push

April 20, 2021
While Big Tech's intent seems positive, the likely beneficiary of the recent Apple/Google privacy push is not the consumer but an effort to force the digital advertising world to restructure itself for their benefit.
Read More
Image of confused man sitting in front of computer about to type signifying insider threats within the organization
Cyber SecurityInsights

“Real” Insider Threats Already Lurking Within Your Organization

February 28, 2018
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
Read More
Window of the multi-story building showing how secure facilities face RF security threats
Cyber SecurityInsights

“Some Devices Allowed” – Secure Facilities Face New RF Threats

August 27, 2020
RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that require more nuanced electronic device policies.
Read More
Electronic devices waste ready for recycling showing data security in asset disposal
Cyber SecurityInsights

“Trust Me” – Taking a Zero-Risk Human-Centered Approach to Data Security

November 11, 2021
For IT asset disposition (ITAD), data safety and destruction isn’t just a technological issue, it’s a human one as well – based on procedure and trust. So how do we build a more trustworthy process?
Read More
Elderly man peering through glasses
Data PrivacyInsights

10 Things You Might Have Missed in Facebook’s Epic 229-Page Response to U.S. Lawmakers

June 25, 2018
In a 229-page document, Facebook attempted to provide some clarity for questions from the congressional testimony to the U.S. House and Senate in April. Here are 10 things you might have missed.
Read More
Businessman holding technology icon showing cloud security
Cyber SecurityInsights

10 Ways to Quickly Improve Security for Your AWS Environment

October 15, 2021
For enterprises, getting up to speed with cloud deployments, migrations, and protecting their cloud infrastructure in time and cost-efficient ways is more important now more than ever.
Read More
Woman standing in front of computer projection showing need for intellectual property protection
Data ProtectionInsights

11 Proven Ways To Protect The Intellectual Property Of Your Business

November 2, 2020
Whether you are a musician, entrepreneur, photographer, inventor, vlogger, or anyone producing original content, you need to protect your intellectual property. Here are 11 proven ways.
Read More
Close up of laptop keyboard and screen
Insights

11 Skills You Need to Have If You Want to Work in Cybersecurity

January 19, 2022
To build a successful career in the sphere of cybersecurity, one should show both considerable technical knowledge and positive personal qualities.
Read More
Cyber SecurityInsights

17 Technical Controls for Effective M&A Due Diligence

April 6, 2022
Among top considerations during the M&A process should be your technical controls. In specific, you need to pay close attention to the software bill of materials (SBOM), and several other vital areas of your technology-enabled business.
Read More
Man wearing a foil hat showing how data privacy came into public consciousness
Data PrivacyInsights

2018 Is the Year Data Privacy Came into Public Consciousness

December 28, 2018
Data privacy came into public consciousness in 2018. Yet, even with new regulations to protect personal privacy, it’s clear that there is still a long way to go in 2019 before personal data is truly protected.
Read More
1 2 3 … 104

Latest

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

Harmony cryptocurrency coin on colorful background showing crypto hack of blockchain bridge

Horizon Blockchain Bridge Latest Crypto Hack Victim, $100 Million Stolen

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results