CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Woamn with Iris recognition technology showing KYC and identity
Cyber SecurityInsights

How To Know and Trust Your Customer: Four Tips for Financial Enterprises

October 7, 2021
With the pandemic accelerating digital transformation, there has also been a surge in fraudulent activity as threat actors are exploiting newly remote operations. In today’s digital world, knowing your customer is more critical than ever before.
Read More
Image of distressed woman speaking on mobile phone with ambulance in the background representing changes in privacy law in Australia regarding breach reporting, big data and the new EU GDPR
Data ProtectionInsights

Privacy Law in Australia: Breach Reporting, New Frontiers of Big Data and Differences with the EU GDPR

April 18, 2017
This article is based on a presentation made by Steven Klimt, a partner in the Sydney office of Clayton Utz during the Data Privacy Asia 2016 conference held on 9-11 November 2016. It outlines the new mandatory data breach reporting legislation, how Australian privacy regulation impacts Big Data and the differences between Australian Privacy legislation and the proposed EU GDPR.
Read More
Man looks at tablet through magnifying glass showing how Google may be helping U.S. government to conduct warrantless searches
Data PrivacyInsights

EPIC Alleges Google May Be Helping U.S. Government Conduct Warrantless Searches

April 18, 2019
Scanning images in billions of users’ files without warrants, is Google helping the U.S. government to conduct warrantless searches and violating the Fourth Amendment?
Read More
Man in front of fingerprint scanner showing identity system
Cyber SecurityInsights

A Modern Identity System Can Positively Impact the Bottom Line – Here’s How

October 11, 2021
A modern identity and access management system is critical to manage access across multiple operating systems, devices, locations and applications, based on what a user should be able to do and what they will need over time.
Read More
Virtual human brain showing the prediction of AI role in cybersecurity for 2020
Cyber SecurityInsights

AI in Cybersecurity: 2020 Predictions

January 24, 2020
Companies are turning to AI to defend their networks and make up for a lack of personnel, but will it be smart enough to recognize a real threat with hackers developing their own AI-powered tools too?
Read More
Man touching on virtual screen padlock showing cloud for ransomware protection
Cyber SecurityInsights

How the Cloud Enables Fast, Easy Recovery From Ransomware and Disasters

November 9, 2021
The relentless march to the cloud is good news for CIOs concerned about ransomware. And once most enterprises have most of their infrastructure there, ransomware attacks will become an occasional annoyance, not a catastrophic disaster.
Read More
Blurred crowd crossing street in a smart city with concept of access control
Cyber SecurityInsights

Is Access Control the Key to Truly Smart Cities?

July 24, 2018
For decades smart cards have been the foundation of access control and security systems. In smart cities, smart cards will play a key multiapplication role across public and private sector services.
Read More
Close up of laptop keyboard and screen
Insights

11 Skills You Need to Have If You Want to Work in Cybersecurity

January 19, 2022
To build a successful career in the sphere of cybersecurity, one should show both considerable technical knowledge and positive personal qualities.
Read More
Composition of binary coding over cityscape showing data handling for data taxonomy
Data ProtectionInsights

Understanding the Taxonomy of Data in Challenging Jurisdictions

January 3, 2022
Any leader handling data in this ever-evolving landscape must understand how to categorize data to better protect their organizations and customers when working in challenging and emerging markets.
Read More
Server racks in data centre showing the challenges of cloud security
Cyber SecurityInsights

Conquering the Cyber Security Challenges of the Cloud

December 31, 2019
Cloud computing has evolved rapidly and brought new risks to cloud security. Companies need to find ways to securely use multiple cloud services and applications.
Read More
1 … 89 90 91 92 93 … 105

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results