CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Data PrivacyInsights

GDPR-Compliant Blockchain: Personal Data Privacy in Blockchain

June 2, 2021
A permissioned blockchain like Hyperledger Fabric network provides more control over data to participants than public blockchain and data subjects have more command over their personal data.
Read More
Simulation of a screen of cctv cameras with facial recognition surveillance technology
Data PrivacyInsights

Facial Recognition Surveillance Now at a Privacy Tipping Point

February 15, 2019
Society is finally starting to wake up to the immense privacy implications of real-time facial recognition surveillance as seen in the latest developments in San Francisco, London and the White House.
Read More
Man in front of fingerprint scanner showing identity system
Cyber SecurityInsights

A Modern Identity System Can Positively Impact the Bottom Line – Here’s How

October 11, 2021
A modern identity and access management system is critical to manage access across multiple operating systems, devices, locations and applications, based on what a user should be able to do and what they will need over time.
Read More
Dashboards in command center showing the five questions which could be used to re-evaluate your MSSP
Cyber SecurityInsights

5 Signs You Should Re-Evaluate Your Relationship with Your MSSP

November 13, 2019
How do you know your MSSP, managed security service provider, can be trusted and is offering higher value security services that extend beyond simple monitoring and analysis?
Read More
Cube figure and social connection lines showing threat intelligence and dark web
Cyber SecurityInsights

Infiltrating the Dark Web for Threat Intelligence Collaboration

February 28, 2022
It’s important that businesses monitor Dark Web trends and activity to monitor what data has been breached and understand where there might be weak links at the employee and enterprise level.
Read More
Woman using video call communication while remote working showing increase in data loss
Cyber SecurityInsights

Remote Working Is Here To Stay – Here’s How To Protect Your Employees From Data Loss

April 28, 2021
Move to mass remote working in 2020 has only made the data loss problem worse. 59% of IT leaders reported an increase in email data loss since the pandemic began.
Read More
A compass, binoculars, knife and a old key on a old wooden desk
Data PrivacyInsights

Past is Prologue

September 16, 2020
Unlike the 18th and 19th century trading companies, today's tech giants use monopoly not to the benefit of the crown and a nation, but instead for their own personal benefit and the benefit of those wealthy enough to own their stock.
Read More
Legal counsel having difficult conversation with a client on dark patterns
Data PrivacyInsights

Avoiding Dark Patterns: Critical Tools for Privacy Legal Counsel

September 17, 2021
How can well-intentioned companies avoid employing dark patterns by mistake? And how can privacy professionals, particularly attorneys, effectively counsel their clients away from this common, yet all too prevalent, practice?
Read More
Hand on audio mixing board showing the rising use of deepfake audio to run AI cyber attacks
Cyber SecurityInsights

The Cutting Edge of AI Cyber Attacks: Deepfake Audio Used to Impersonate Senior Executives

July 18, 2019
Deepfake audio is becoming the powerful new tool to perform AI cyber attacks by impersonating executives to convince employees to authorize money transfers.
Read More
Image of smashed iPhone representing the recent U.S. vs Apple case
Data PrivacyInsights

The Recent US v. Apple Case in Context (Part II)

June 21, 2016
In this, the second of a series of articles, Professor Reich examines the implications of the battle between Apple and the U.S. government for other jurisdictions worldwide.
Read More
1 … 92 93 94 95 96 … 105

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results