CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Lock on laptop keyboard showing how ISO standards can protect data
Data ProtectionInsights

ISO Standards for Information and Data Protection

August 20, 2020
Information and data are key elements for an organization’s daily operations and need to be protected properly. ISO standards can help provide requirements, guidance, and recommendations for a systematic approach. Read More
Data flowing through cyberspace showing how distributed SaaS solution can help with global data regulations
Data ProtectionInsights

Implementing a Distributed SaaS Solution While Keeping Up with Global Data Regulations

August 19, 2020
Distributed SaaS platform can help enterprises expand their business, comply with global data regulations, and avoid hefty cyber losses and cybersecurity spending. Read More
Image of data and security showing the legality of web scraping
Data PrivacyInsights

Navigating the Legal Landscape Surrounding Web Scraping

August 18, 2020
Companies who conduct web scraping or do business with data harvesters need to understand the nuanced legality of web scraping so they can better navigate the risks associated with the practice and protect themselves from liability. Read More
Happy friends using smartphones and social media showing impact of LGPD on user experience
Data ProtectionInsights

Privacy First – How Data Protection Laws Impact on User Experience

August 13, 2020
With the LGPD (the Brazilian Data protection Law) coming into force in August 2020, how can companies address the challenges of customer experience? Read More
Man using virtual interface showing PrivacyOps for privacy compliance
Data PrivacyInsights

PrivacyOps: Reimagining Privacy Compliance

August 13, 2020
PrivacyOps is an emerging framework that reimagines how to efficiently implement and operationalize privacy management throughout an organization in an agile manner. Read More
Business team meeting showing need to consider backup plans
Cyber SecurityInsights

Backup Plans for When Systems Encounter Problems and Communication Is Lost

August 12, 2020
Your backup plan should be living strategies that are constantly being adjusted based on system developments and aligned with any financial, insurance, resource, and compliance restrictions. Read More
Automobile mechanic repairman checking a car engine with checklist showing need for CCPA compliance
Data ProtectionInsights

CCPA Compliance: Going Beyond Compliance Checkboxes

August 11, 2020
With the regulation now in force, some businesses may find themselves treating CCPA compliance as merely a checkbox but ready or not, enforcement is here, and the price for non-compliance can be extremely high. Read More
Man shows IoT devices in palm showing the need for IoT security
Cyber SecurityInsights

Security in IoT – Why It Matters

August 6, 2020
As the IoT revolution brings changes to society, it is introducing new classes of risk requiring IoT security to adapt to the changing threat landscape. Read More
Statue of the Goddess of Justice against EU flag showing reliance on SCCs with Privacy Shield gone
Data ProtectionGeneralInsights

So the Shield Is Gone, What About SCCs?

August 5, 2020
While confirming that SCCs are valid with the Privacy Shield gone, the CJEU underlined that they can only be relied upon when risks have been properly assessed and cannot amount to a “tickbox exercise. Read More
Programming code abstract technology background showing need for balanced development automation
Cyber SecurityInsights

Using a ‘Three Lines of Defense’ Program to Balance Development Stakeholder Needs

August 5, 2020
Development automation needs to shift from an almost exclusively technical automation-for-speed perspective to a more business centric perspective of automation-for-balance. Read More
Load More

Latest

Woman holding mobile phone with username and password login screen showing phishing campaign

Attackers Load Targeted Company’s Homepage in Email Phishing Campaign

Close up of girl paying music services with credit card showing Magecart attack on ecommerce site

Hackers Accessed Personal and Credit Card Information in Warner Music Group Magecart Attack

Indian friends using their mobile phones showing national security concerns with Chinese apps

India Expands National Security Ban of Chinese Apps; 118 Forbidden in Wake of Renewed Border Tensions

Close up of Apple MacBook Pro showing macOS malware

Apple Certifies the Most Prevalent macOS Malware Through Its Notarization Process – Twice

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Privacy Center
Do not sell my information

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results