CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Access Control
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Access Control

Businessman touch a virtual screen to unlock and access information showing identity management and access control
Cyber SecurityInsights

Mastering Authorization in Modern and Dynamic Environments

March 17, 2023
Cloud and mobility, including the blurred lines between personal and corporate devices has increased the complexity of identity and access management. Likewise, the surge in the sheer volume and variety of data has contributed to a more dynamic and multifaceted authorization process for enterprises.
Read More
System hacked warning alert on notebook showing authorization and access control
Cyber SecurityInsights

Authorization Oversight: The Data Security Pitfall Keeping You at Risk

March 3, 2023
From Uber to MailChimp, even the most technologically advanced and capable companies seem to struggle with keeping sensitive data safe and secure. And much of it comes down to one major data security pitfall – authorization oversight.
Read More
Virtual lock over servers in data center showing access management for Active Directory
Cyber SecurityInsights

Using Access Management for Your Active Directory Users

October 13, 2020
Securing Active Directory credentials is absolutely crucial to protect against network breaches. Access management can help put a protective layer at the forefront of your network.
Read More
Man using laptop at desk in mountain field showing how you can minimize the cyber security risks of remote working
Cyber SecurityInsights

Work Remotely, Stay Secure!

April 13, 2020
Remote working is rapidly increasing in current pandemic situation but every remote connection creates a new access point that hackers can exploit. What can you do to fully minimize the risks?
Read More
Code on screen showing password reuse problem in exposed login credentials
Cyber SecurityNews

Billions of Login Credentials Exposed in Largescale Attacks Involved Password Reuse

February 19, 2020
Study on 9 billion recovered login credentials shows significant password reuse which can help cybercriminals conduct credential stuffing attacks and possible account takeover.
Read More
Man using Instagram app on mobile showing the Instagram password leak that exposed 10,000 plaintext credentials
Cyber SecurityNews

Another Instagram Password Leak? Third-Party Follower Bot Exposes Plaintext Credentials of Thousands of Accounts

February 13, 2020
Latest Instagram password leak has exposed 10,000 plaintext credentials in the SocialCaptain app, allowing anyone to access any app profile by entering a unique user ID into a public URL.
Read More
Hacker working on laptop showing Botnet owner reveals Telnet access credentials for over half a million devices
Cyber SecurityNews

Botnet Owner Reveals Telnet Access Credentials for Over Half a Million Devices

January 31, 2020
Owner of a botnet has leaked the access credentials for more than 515,000 servers and claimed they were changing business models to make use of cloud service providers instead.
Read More
Microsoft Office 365 application icons on computer screen showing how hackers use Microsoft OAuth apps in new phishing attack
Cyber SecurityNews

Microsoft OAuth Apps the Target of Cunning New Phishing Attack

January 22, 2020
A new phishing attack started to surface where hackers leverage on Microsoft OAuth apps to steal user credentials from SharePoint and OneDrive users using official Office 365 login page.
Read More
Hacker using smart phone showing the major password breach of game developer Zynga which compromised 170 million accounts
Cyber SecurityNews

Password Breach of Game Developer Zynga Compromises 170 Million Accounts

December 30, 2019
A major password breach which was first reported this September has just been confirmed by Zynga. It appears that the 170 million affected users were not notified when the original breach news broke.
Read More
Computer security code abstract image showing endemic password reuse
Cyber SecurityNews

Password Reuse Endemic Among Microsoft Customers

December 23, 2019
In spite of many, many public warnings, users of Windows and Microsoft's various cloud-based services appear to still be committing the cyber sin of password reuse.
Read More
Load More

Latest

Hand in a glove on a laptop keyboard and a medical stethoscope showing healthcare provider data breach

Massive Data Breach at Healthcare Provider ILS Compromises Millions of Patients

Man using laptop with ChatGPT showing AI and cyber threats

Can Security Keep Up With ChatGPT Evolutions?

Entrance to the FBI building showing cyber crime report

FBI Annual Internet Crime Report Finds Hot New Trend in Online Scams: “Pig Butchering”

Person about to delete TikTok showing UK TikTok ban on government devices

Following US Federal TikTok Ban, UK Blocks the App From Government Devices

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results