CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Defense
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Defense

Business intelligence dashboard with graph and icons showing data intelligence should be seen as accountability instead of security
Data PrivacyInsights

Data Intelligence Not as Security, but as Accountability

October 30, 2019
Data intelligence is not a cybersecurity solution to prevent hackers from stealing information, however it gives organizations the visibility to their data ecosystem and the agility to handle breaches. Read More
Man touching circuit brain hologram with business icons showing how AI can champion cybersecurity in the insurance industry
Cyber SecurityInsights

How AI Can Champion Cybersecurity in the Insurance Industry and Beyond

September 18, 2019
Cybersecurity is an ever-changing landscape with attackers constantly trying to develop new threats. See how companies are turning to AI to secure their sensitive data. Read More
Woman using fingerprint scanner showing the reasons why most modern online fraud prevention methods are falling short
Cyber SecurityInsights

Why Most Modern Online Fraud Prevention Methods Are Falling Short

February 28, 2020
Companies are constantly working on online fraud prevention methods while cybercriminals fine-tune their impersonation efforts. Find out why some of the authentication methods are falling short. Read More
Server racks in data centre showing the challenges of cloud security
Cyber SecurityInsights

Conquering the Cyber Security Challenges of the Cloud

December 31, 2019
Cloud computing has evolved rapidly and brought new risks to cloud security. Companies need to find ways to securely use multiple cloud services and applications. Read More
Picture of a conference room showing how cybersecurity leaders can effectively communicate and position security risks to their C-suite
Cyber SecurityInsights

How Cybersecurity Leaders Can Best Navigate the C-Suite

September 13, 2019
Recent major data breaches and fines show that companies cannot delay a good cyber defense plan any longer. How should cybersecurity leaders effectively communicate and position security risks to their C-suite? Read More
Biometric identification on man’s eye showing the technologies to protect digital identity
Cyber SecurityInsights

Who am I? Defining Digital Identity

January 2, 2020
Digital identity is important as it’s closely tied to the data that represents us or the technologies that act on our behalf. What are the ways that can help us secure our digital identity? Read More
Gavel on keyboard showing the reveal of lax security protections from Equifax lawsuit
Cyber SecurityNews

Equifax Lawsuit Reveals Embarrassingly Lax Security Protections

October 30, 2019
A group of angry shareholders is behind the new Equifax lawsuit which alleged the company has not adequately disclosed risks or security practices that led to the worse data breach violation in history. Read More
Hacker working on computer showing how company can keep up with ethical hacking
Cyber SecurityInsights

Ethical Hacking is Evolving – Here’s How Your Company Can Keep Up

September 5, 2019
Companies are opening up to latest cybersecurity strategies like ethical hacking to unearth their digital vulnerabilities. What could they do to ensure the hackers do not endanger their data? Read More
Network map on globe showing how we can defend against cyberwar
Cyber SecurityInsights

Cyberwar: How It Could Unfold and How We Can Defend Against It

April 17, 2020
What will a cyberwar look like? Find out why you should not think about preparing for the next cyberwar but rather you should be preparing for many. Read More
Virtual communication network map against city view showing the importance of a strong IoT security posture
Cyber SecurityInsights

A Strong Security Posture Is Critical for IoT

December 20, 2019
A stronger IoT security posture is critical with a recent Kaspersky report showing a nine-time increase of attacks on IoT devices in the first half of 2019 compared to the first half of 2018. Read More
Load More

Latest

Abstract code background showing supply chain attack on Git server

PHP Team Averted a Supply Chain Attack After Hackers Compromised Their Self-Hosted Git Server and Inserted a Backdoor

Google Ads logo on smartphone screen showing national security concern over ad auctions of ad exchanges

US Senate Scrutinizing Ad Exchanges Over Foreign Ad Auctions

Young Caucasian man make notes working on laptop participating in security awareness campaign

4 Critical Elements of Effective Security Awareness Campaigns

Close-up view of Booking.com logo on its website showing fine due to late data breach notification

Hefty Fine for Booking.com Due to Delayed Data Breach Notification; With Little Financial Information Stolen, Is the Amount Excessive?

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results