CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
News
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

News

Latest news on data protection, privacy and cybersecurity regulatory developments, data breaches and enforcement actions happening around the world.

Safe Harbor is Dead Meet the New Privacy Shield
Data PrivacyNews

Safe Harbor is Dead! Meet the New Privacy Shield!

February 10, 2016
On Feb. 2, 2016, representatives of the European Commission and the United States agreed on a new framework for transatlantic data flow: the EU-US Privacy Shield, a new framework intended to replace the EU-US Safe Harbor that was invalidated as a result of a decision of the EU Court of Justice.
Read More
Image of Manila skyline representing the Philippines National Privacy Commission on the Comeleak data breach
Cyber SecurityNews

‘Comeleak’ Allows Philippine National Privacy Commission to Show Teeth

January 25, 2017
Privacy issues in the Philippines have become headline news as 2017 gets underway. In January, the National Privacy Commission (NPC) in that country issued a statement placing the blame for a data breach that put the personal information of millions of voters at risk squarely at the feet of the Commission on Elections (COMELEC) and its Chairman Andres Bautista.
Read More
Image of computer screen with lock on office desk representing change in the FCC privacy rules in the U.S.
Data PrivacyNews

FCC Privacy Rules Gets a Makeover in the U.S. – And It’s Not Pretty

April 20, 2017
The rolling back of the broadband privacy rules set in place by the Obama administration only a short time ago should concern everyone with a stake in privacy. The Trump government has bowed to pressure from ISPs to allow them to in effect gather browsing data from customers – and then monetise that data through on selling it to marketing and advertising companies. In this article, we examine just how we have arrived at this point.
Read More
Image of man wearing headphones and arms raised representing the privacy infringement claim on Bose
Data PrivacyNews

Bose Hit with Privacy Infringement Claim

April 25, 2017
A customer filed a privacy infringement claim on Bose, claiming that the Bose Connect app is quietly gathering data on his listening habits and onselling that information a data mining company.
Read More
Image of wolves hunting representing the 'Hack the Air Force' bug bounty program for white hats
Cyber SecurityNews

Bugs and Bombs – Why White Hats Want to ‘Hack the Air Force’

May 1, 2017
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems.
Read More
Image of depressed man in front of computer screen representing how vulnerable teens are targeted by Facebook's sentiment analysis
Data PrivacyNews

Is Facebook’s Sentiment Analysis Targeting Vulnerable Teens?

May 5, 2017
Facebook's sentiment analysis understands the emotions of vulnerable teens and and is giving that data to advertisers to help understand market segments.
Read More
Image of woman using mobile phone showing privacy settings representing how telco will give consumers better privacy control over data
Data PrivacyNews

Telco Gives Consumer Privacy Control Over Data

May 11, 2017
Telefónica in Germany has announced a partnership with U.K. firm People.io to power an app through which the telco giant's customers can control some of their data.
Read More
Image of UK parliament building against a dark cloudy sky representing the use of big data in politics
Data PrivacyNews

Big Data in Politics and The Biggest Business of All

May 25, 2017
Big data in politics has become big news in the United Kingdom as the Guardian newspaper reports that the vote for the UK to leave the European Union saw two international companies manipulating public opinion through the use of big data mining techniques.
Read More
Image of Macbook, iPad and iPhone representing how online advertising will be disrupted by Apple's privacy play
Data PrivacyNews

Apple’s Privacy Play to Disrupt Online Advertising

June 12, 2017
Apple may just have found the solution to counter Google by focusing on Apple's privacy commitment to their customers, especially in online advertising.
Read More
Image of Buckingham Palace representing the new era for UK data protection based on the Queen's speech
Data ProtectionNews

Queen’s Speech Heralds New Era for UK Data Protection

June 27, 2017
The 21st of June 2017 saw UK’s Queen Elizabeth give what is generally known as ‘The Queen’s Speech’ in which Her Majesty gave some insights into just how seriously the UK government is taking issues of online privacy and data protection.
Read More
1 2 3 … 308
- Advertisement -
- Advertisement -

Latest

Skull on screen showing vulnerability exploitation and stolen credentials in DBIR

Verizon 2026 DBIR: Vulnerability Exploitation Leaps Ahead of Stolen Credentials as #1 Initial Breach Cause

Hacker working on computer monitors showing cyber attack

Cyber Attack by Nitrogen Ransomware Hits Foxconn, Disrupting North American Operations

Screen with AI showing training data

Protecting Sensitive Training Data in the Age of AI

British pounds bills and judge hammer showing data breach of water supplier

British Privacy Watchdog Fines Water Supplier $1.3 Million Over a Multi-Year Data Breach

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Digital
Insights
News
Resources
Press Releases

© 2025 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Cyber Attack Regulations Ransomware Attack
    See all results