CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Image of hand putting CD in the tray of a laptop signifying the difficulty to know where your data is
Cyber SecurityInsights

It’s 2018, Do You Know Where Your Data Is?

April 16, 2018
Anyone dealing with critical information should pay attention to the data they handle, how they are accessing it, and where it originated. The idea is to maintain the integrity of the data and the chain of custody, which is a concept that involves the strict ownership and control over the item in question.
Read More
Image of woman with stethoscope and holding a report and connected globe signifying the internet health report with critical issues of Big Tech, fake news and IoT security
Data PrivacyInsights

Mozilla Internet Health Report Highlights 3 Critical Issues: Big Tech’s Growing Power, Fake News and IoT Security

April 10, 2018
Mozilla's first-ever Internet Health Report highlights the key challenges affecting the creation of an open, safe and accessible Internet – Big Tech’s growing power, the collapse of privacy especially with IoT security, and the spread of fake news. All of these challenges point to deeper problems with the Internet.
Read More
Image of two policemen walking along the street with onlookers signifying predictive policing and how that may result in biased arrests
Data PrivacyInsights

Does Predictive Policing Really Result in Biased Arrests?

April 9, 2018
Predictive policing models have shown remarkable ability to help clamp down on illegal activity and reduce crime. But do these methods lead to systematic bias against certain minority communities or ethnic groups? IUPUI study based on real-world data shows there is no statistically significant evidence of racial bias.
Read More
Image of man using finger to control futuristic display sirnifying use of cyber security automation to battle against hackers
Cyber SecurityInsights

Cyber Security Automation Is One Key Factor in Winning the Battle Against Hackers

April 5, 2018
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation.
Read More
Image of lock on network cables on top of keyboard showing need for network security
Cyber SecurityInsights

What You Should Already Be Doing for Your Network Security

April 4, 2018
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks.
Read More
Image of lock on hard disk signifying data protection against ransomware attack
Cyber SecurityInsights

Ransomware Attack of 2018 Isn’t Coming – It Has Arrived

April 2, 2018
The ransomware threat landscape continues to evolve and the spreading mechanism has changed, shifting from simple phishing attacks, spam and drive-by-downloads to more sophisticated techniques. These advanced techniques in ransomware has proven successful in massive global attacks for 2017. What's coming in 2018?
Read More
Image of European Union flags in front of building signifying considerations of legitimate interests for GDPR privacy compliance
Data ProtectionInsights

Legitimate Interests: Being Comfortable with Uncertainty

March 30, 2018
With the EU GDPR right around the corner, you have probably heard that there will be six legal bases for processing personal data. For organizations who are currently preparing for GDPR, there is a strong focus on – as well as some confusion around – legitimate interests, in particular. Let's take a closer look.
Read More
Image of man in hard hat holding a bitcoin signifying cryptocurrency scams using celebrity twitter accounts
Cyber SecurityInsights

Beware the Latest Cryptocurrency Scams Involving Celebrity Twitter Accounts

March 28, 2018
As prices of cryptocurrencies continue to skyrocket, fraudulent cryptocurrency scams are on the rise. Twitter cryptocurrency scams impersonating celebrities or influencers are so popular with cryptocurrency thieves and hackers simply because they are so easy to pull off on a daily basis.
Read More
Image of house made of dollar notes on fire signifying impact of cybersecurity incidents on financial institutions
Cyber SecurityInsights

The Impact of Cybersecurity Incidents on Financial Institutions

March 26, 2018
The only guarantee today is that nefarious parties will continue to find new ways to infiltrate networks at financial institutions. Therefore, we must implement best practices to protect against cybersecurity incidents, as well as to resolve all possible issues that can arise should a cyberattack occur.
Read More
Image of man sitting in a car holding a camera with zoom lens signifying the use of online behavioral tracking for spying on users
Data PrivacyInsights

Online Behavioral Tracking: Who’s Spying on Your Every Move?

March 19, 2018
When consumers shop online many do not realize that they are not only handing over their hard-earned cash, there’s another transaction that is happening at the same time – online behavioral tracking. Data about you is being gathered, shared and analyzed to determine what you see and to shape your online experience.
Read More
1 … 91 92 93 94 95 … 105

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results