CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Insights
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Image of man in front of computer and identified by facial recognition technology signifying the concerns of privacy and mass surveillance
Data PrivacyInsights

Facial Recognition Technology Raises Privacy and Mass Surveillance Concerns

October 12, 2017
Use of facial recognition technology is growing in both public and private sectors amid increasing concerns over data privacy and mass surveillance. Read More
Glass globe and stethoscope on a computer keyboard showing the need for healthcare industry to have an active cybersecurity community
Cyber SecurityInsights

Why Does the Healthcare Industry Need an Active Cybersecurity Community?

December 23, 2019
With many security communities providing information sharing, how should cybersecurity professionals in the healthcare industry choose to ensure their community time is well-spent? Read More
China flag on the circuit board showing TikTok ban is just one concern with Chinese IoT
Cyber SecurityInsights

Life After TikTok: Why Chinese IoT Is the Next Tech Battleground

October 5, 2020
The surveillance concerns surrounding TikTok are legitimate, yet they are no more legitimate than the spyware potential of countless Chinese IoT devices. Read More
Privacy screen on mobile phone showing need to stay safe and secure our data
Data PrivacyInsights

I Fear Ghosts and Facebook: Is There a Way to Stay Safe and Secure Our Data?

April 3, 2019
Technology should provide us with the tools we need to feel in control of our personal data, not the opposite. Is there any technology available that can actually stop the companies from making money out of our data? Read More
Metal padlock over digital matrix showing need for data governance over WFH
Data ProtectionInsights

Adapting Data Governance to WFH Reality

September 17, 2020
The goal for stepping up WFH data governance isn’t simply compliance but to go forward with policies and procedures that enable better results and build brand trust with consumers, business partners and others. Read More
Military soldiers training in military camp showing how civilian technology can have an impact like the Strava heat map incident
Cyber SecurityInsights

Strava Heat Map Incident: How Civilian Technology in Military Settings Needs to Be Controlled

August 29, 2018
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings. Read More
Technicians in data center examining servers showing the importance of finding legacy applications to prevent data breach
Cyber SecurityInsights

Unknown Legacy Applications Are Putting Your Company at Risk. Here’s How to Find Them.

May 1, 2019
Legacy applications are a common unknown for enterprises and represent an attack surface of customer data endpoints which could put their data at risk. Do you know how to find them to prevent data breaches? Read More
Car engine in workshop showing privacy engineering for privacy regulations
Data ProtectionInsights

6 Engineering Principles to Prepare You for Any Privacy Regulation

December 10, 2020
To prepare for any privacy regulation, adopt a core technical framework where privacy controls can be applied to any new or existing system. Read More
Employees walking in office showing the cybersecurity risks of office reopening with the loosening of stay-at-home restrictions during COVID-19
Cyber SecurityInsights

Office Reopening and It’s Time to Head Back In? How Smart Forethought Can Improve Cybersecurity When Reopening Offices

June 25, 2020
As stay-at-home restrictions start to loosen with COVID-19 cases declining, the office reopening is going to bring an increase in cybersecurity risks that companies should be prepared for. Read More
Close-up of eyeglasses, cellular phone and pen at workplace on background of CISO speaking to business and operations leaders
Cyber SecurityInsights

What Does It Take to Become a Leading CISO?

September 24, 2018
The role of the CISO is becoming more vital to companies of all types on a global scale. Aside from being an executive-level role, the CISO must possess the necessary skills to unite multiple aspects of the business into one secure, digital front. Read More
Load More

Latest

Magnifying glass over VMware website showing security bug affecting VMware servers

Over 6,700 VMware Servers With Remote Code Execution Security Bug Exposed to the Internet

Retro robots watch bots on TV showing increase in marketing fraud

The Growing Problem of Marketing Fraud: Bots Pose as Legitimate Internet Users to Fake Traffic, Milk Digital Advertising Services

Padlock on keyboard showing importance of CMMC framework for cybersecurity and data privacy

Reflecting Back on Data Privacy Day 2021: Why This Day Mattered More Than Ever Before

A Macbook Pro keyboard showing problem with macOS malware

macOS Malware Silver Sparrow Affects About 40,000 Macs Running Both Intel and ARM Chips

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results