CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Aerial view of oil refinery plant showing critical infrastructure cyber defense
Cyber SecurityInsights

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

June 30, 2022
While cyber defense efforts like those backed by DoE are clearly a net positive for the nation, the prospective contributions of these and other efforts must be tempered by both practical assessment of the strategic context of foreign critical infrastructure attacks.
Read More
Binary code particles and neon glowing cyber wave showing ESG frameworks
Data PrivacyInsights

Why Business Leaders Must Incorporate Data Privacy Into ESG Frameworks

June 29, 2022
An environmental, social, and governance (ESG) framework is not a new business term, but what it means for a given company is constantly changing. There’s an emerging area that’s quickly gaining traction in the new, better understanding of ESG - data privacy.
Read More
Brown envelope and USB flash memory drive showing cyber physical threat
Cyber SecurityInsights

How CSOs and CISOs Can Bridge the Gap Between Physical and Cybersecurity

June 28, 2022
As the world becomes more digitally integrated, hacker groups will continue to take advantage of the physical blindspot that many companies have to launch attacks against digital infrastructure. A cyberthreat that comes by way of a physical device is known as a “phygital” threat.
Read More
User typing password on screen showing portable digital identity
Cyber SecurityInsights

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

June 27, 2022
In a digitally-advanced modern world, replacing passwords seems like an uphill battle. But with the concept of portable digital identities, renowned brands are putting the foundation stone for a whole-new rich experience for users worldwide.
Read More
Team discussing cybersecurity strategy in front of laptops
Cyber SecurityInsights

Can Your Cybersecurity Strategy Stop a Determined Attacker?

June 24, 2022
If your current system isn’t capable of tracking and assessing different user variables online, chances are your business isn’t fully prepared to stop a determined attacker. What layers is your cybersecurity strategy missing?
Read More
Opened hand levitating virtual objects showing Web3
Cyber SecurityInsights

What Does Web3 Truly Look Like?

June 23, 2022
New, decentralized Web3 technologies stand to address virtually all concerns of the old internet, but there’s a catch. All too often these networks are still built upon legacy infrastructure, and, as such, are exposed to many of the same defects.
Read More
Developers working together showing DevSecOps and threat modeling
Cyber SecurityInsights

A Case for Modernizing Threat Modeling in 2022

June 22, 2022
More recent approaches to threat modeling is including DevSecOps, putting a greater focus on developers as a critical arm of cybersecurity. Additionally, threat modeling is pulling away from a reliance on security professionals looking at finished products, instead asking engineering to embrace the concept of security as code.
Read More
People walking on road in China showing PIPL
Data ProtectionInsights

Key Questions Answered for China’s Personal Information Protection Law

June 21, 2022
China's PIPL mirrors the GDPR in terms of many of its core requirements and penalties, but some requirements are nuanced and and may require a refresh review of the existing company policies and procedures, which may create additional operational burdens.
Read More
Businessman using smart phone and finger touching security sign, business showing modern authentication and certificate-based authentication
Insights

Where Does Certificate-Based Authentication Fit Into Modern Authentication?

June 21, 2022
Making the transition to Modern Authentication is not without its challenges. As enterprises make the switch, it is important to plan your Access Management strategy so that it can benefit both 2FA, adaptive authentication, and conditional access.
Read More
Working on a neon computer keyboard showing ransomware
Cyber SecurityInsights

Why Hackers Are Winning the Ransomware Game

June 20, 2022
How does one manage to create a strategy that can best position your organization to win against ransomware should you become the victim of an attack? Implementing a twofold approach combining Secure Access Service Edge (SASE) framework and zero trust is critical.
Read More
1 2 3 … 104

Latest

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

Harmony cryptocurrency coin on colorful background showing crypto hack of blockchain bridge

Horizon Blockchain Bridge Latest Crypto Hack Victim, $100 Million Stolen

Aerial view of oil refinery plant showing critical infrastructure cyber defense

Why Investments in Better Infrastructure Cyber Defense Are Just a Start

Hacker hand stealing data from laptop at night showing data breach

Flagstar Bank Data Breach Leaked Sensitive Information of 1.5 Million Customers

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results