CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Insights
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Image of stethoscope on heartbeat chart showing how privacy management software is needed
Data ProtectionInsights

The Ultimate Guide to Buying Privacy Management Software

May 4, 2018
Privacy management software can help you increase your efficiency and accuracy by automating complex or high volumes of privacy management activities, including privacy impact assessments (PIAs)/data protection impact assessments (DPIAs), data mapping/data inventory, and enterprise assessments. How do you choose?
Read More
Image of man sitting behind laptop and hammer signifying the consent decree from the FTC settlement with Facebook
Data PrivacyInsights

What did the Consent Decree from the FTC Settlement with Facebook Really Change?

May 3, 2018
As much as Facebook would like to sweep the Cambridge Analytica data scandal under the rug, signs continue to mount that the company is still playing fast and loose with user data. All this raises the question of whether the 2011 FTC settlement that resulted in an 8-count consent decree actually went far enough.
Read More
Image of man holding a smartphone with image of hammer representing privacy legislation emerging to govern technology in the wake of the Facebook Cambridge Analytica case
Data PrivacyInsights

The Most Likely Piece of Privacy Legislation That Could Emerge From the Facebook Cambridge Analytica Case

April 30, 2018
Of all the legislation currently on the horizon, the Honest Ads Act seems to have the best chance of passage. The legislation is easy to understand and has bilateral support as well as the tacit support of Facebook, which is under pressure to show that it is changing and has the best interests of users at heart.
Read More
Image of hand holding up mobile phone with the facebook page signifying how your relationship with facebook is complicated
Data PrivacyInsights

Your Relationship with Facebook … It’s Complicated

April 27, 2018
Whether you are a user or not, you have a relationship with Facebook. With the latest revelations of the Cambridge Analytica "breach", it is becoming more and more obvious that whether you like it or not, your data will be harvested – and “sold”. Privacy choice and control is no longer fully in your hands.
Read More
Image of woman explaining contract document in front of laptop to two men showing how there are lurking pitfalls in the blockchain contract era
Cyber SecurityInsights

Lurking Pitfalls for the Unwary in the Blockchain Contract Era

April 26, 2018
Both governments and companies are shepherding the application of blockchain technology across various industries, and of particular interest is how the technology will usher in an era of blockchain contracts. While the blockchain holds promise, there are legal concerns beyond the technological benefits and challenges.
Read More
Image of man with arms raised sitting on floor with a laptop and cash flying around signifying the idea of how facebook will monetize your data
Data PrivacyInsights

How Facebook Will Monetize Your Data in the Future

April 25, 2018
No matter what future laws and regulations are imposed on Facebook, there will never be a law against storing customer data for in-company purposes. Facebook got in hot water for allowing tactics that manipulated elections. The 2056 presidential campaign could be entirely run online where Facebook likes replace votes.
Read More
Image of man holding spanners above a toolbox signifying the must-have security tools for achieving GDPR compliance
Cyber SecurityInsights

A Guide to the Must-Have Security Tools for GDPR Compliance

April 23, 2018
GDPR requires a comprehensive approach to information security, compliance, governance and risk. Even though security tools are just one piece of the GDPR compliance puzzle, they are an important aspect of protecting consumer data privacy. What are the eight must-have security tools for maintaining GDPR compliance?
Read More
Image of finger tapping on ipad to login to facebook showing the idea of taking a closer look at the data scandal surrounding Facebook and Cambridge Analytica
Data PrivacyInsights

Inside the Facebook Cambridge Analytica Data Scandal

April 22, 2018
The Facebook Cambridge Analytica data scandal has garnered attention worldwide for helping to spotlight a very real problem with data privacy on the Internet. CPO Magazine will be providing ongoing coverage as we believe this to be a pivotal moment which will shape the future of how tech companies use consumer data.
Read More
Image of inverted Facebook 'Like' icon against a backdrop of bits representing how action was not taken for security warnings from experts
Data PrivacyInsights

How Facebook Ignored Security Warnings for 3 Years

April 20, 2018
The average social media user would be forgiven for thinking that Facebook’s data scandal had come seemingly out of nowhere. There were security warnings from industry experts dating as far back as 2013. Using one of the APIs, a loophole reported in 2015 allows hackers to gather millions of personal data from Facebook.
Read More
Image of man wearing a tie in front of microphones doing a media interview on data breaches for Under Armour and Panera Bread
Cyber SecurityInsights

A Tale of Two Data Breaches – Under Armour and Panera Bread

April 19, 2018
Recent data breaches at Under Armour and Panera Bread has been making headlines. But the approach taken to mitigate the threat to consumers could not have been more different. One is a lesson on best practice and the other is a cautionary tale on how not to handle malicious attacks aimed at seizing consumer data.
Read More
1 … 93 94 95 96 97 … 108

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results