CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Defense
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Defense

Image of man using laptop with lock on the screen representing the web security upgrade needed for U.S. federal websites
Cyber SecurityNews

U.S. Federal Websites in Urgent Need of Web Security Upgrade

December 8, 2017
The U.S. Federal Government is a behemoth that touches every aspect of American life – and today the services and information needed by U.S. citizens are increasingly found online. However, the latest report on the state of U.S. federal websites indicates that they fail on some key indicators regarding web security. Read More
Image of man holding magnifying glass signifying executive taking care of business using a security to-do list
Cyber SecurityInsights

Are You Takin’ Care of Business? Your Security To-Do List

March 5, 2018
Don’t wait for cybercrime to find you - remember that the best defense is always a good offense. Be a cybersecurity rock star. Just like any musician, you’ll have your big hits and your flops. But when you can see where you're going, with the right visibility into your systems, you will be TCB, takin’ care of business. Read More
Image of lock on network cables on top of keyboard showing need for network security
Cyber SecurityInsights

What You Should Already Be Doing for Your Network Security

April 4, 2018
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks. Read More
Image of man using finger to control futuristic display sirnifying use of cyber security automation to battle against hackers
Cyber SecurityInsights

Cyber Security Automation Is One Key Factor in Winning the Battle Against Hackers

April 5, 2018
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation. Read More
Image of great leadership instead of analyst firms in a boardroom making cyber security decisions
Cyber SecurityInsights

What Analyst Firms Won’t Tell You: Great Leadership Drives the Best Cyber Security Decisions

May 18, 2018
Making educated decisions about cyber security requires high-quality information. Analyst firms are happy to provide information. But is the information they provide genuinely useful? Are they adding value to the conversation? Ultimately, great leadership, thoughtful strategy and superior execution is key to success. Read More
Rear View Of A Hacker Using Multiple Computers
Cyber SecurityNews

New Government Reports Shows Federal Agencies Facing Significant Cyber Security Risks

June 18, 2018
New report shows nearly 75 percent of U.S. federal agencies are still woefully unprepared and deemed to be “at risk” or “at high risk” of a cyber attack. Read More
Frustrated small and medium business *SMB) owner working on laptop computer at office
Cyber SecurityInsights

Cybersecurity Advice for Small and Medium Business

August 3, 2018
Today most small and medium businesses adopt a reactive approach to cybersecurity – protect, pray and then react. Here are 7 criteria an SMB should look for when selecting solutions for a layered cyber defense. Read More
Outdoor summer shower closeup with the trickling water showing the need for cyber hygiene as part of getting cyber security basics right
Cyber SecurityInsights

Cyber Hygiene: The Need to Focus on Cyber Security Basics

August 21, 2018
According to Tripwire's State of Cyber Hygiene report, many organizations are simply not getting their cyber security basics right. And there is a distinct lack of focus on the proper maintenance and basic protection organizations need to put in place for cyber defense. Read More
Computers in office with empty seats for cybersecurity training and how the human-factors is still valuable
Cyber SecurityInsights

The Human-Factor in Cybersecurity Training: Why Adopting a Holistic Approach Is Most Valuable

August 27, 2018
Google has a vision for users to not have to think about cybersecurity, even as the human factor is the weakest link. Realistic cybersecurity training is still critical as we can't fully trust and rely on technological capabilities. Read More
School teacher teaching students showing the cyber security problem in the education environment
Cyber SecurityInsights

Getting Educated on Cyber Security in an Education Environment

March 13, 2019
The education sector is an extremely underserved cybersecurity market. It is past time to draw attention to an ongoing and very serious problem facing the US education system: our schools are ill-equipped to face the mounting threats posed by hackers. Read More
Load More

Latest

Abstract code background showing supply chain attack on Git server

PHP Team Averted a Supply Chain Attack After Hackers Compromised Their Self-Hosted Git Server and Inserted a Backdoor

Google Ads logo on smartphone screen showing national security concern over ad auctions of ad exchanges

US Senate Scrutinizing Ad Exchanges Over Foreign Ad Auctions

Young Caucasian man make notes working on laptop participating in security awareness campaign

4 Critical Elements of Effective Security Awareness Campaigns

City skyline of Sacramento, California

Data Privacy and Data Protection in California

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results