CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Defense
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Defense

Hackers wearing gloves working on laptop showing what enterprises can do to battle cyber attack
Cyber SecurityInsights

How Enterprises Can Battle Cyberattack Onslaught

April 15, 2020
New cybersecurity technologies will help companies better handle a cyber attack but they need to use more efficient methods to evaluate solutions that meet their security and regulation needs. Read More
Man using laptop at desk in mountain field showing how you can minimize the cyber security risks of remote working
Cyber SecurityInsights

Work Remotely, Stay Secure!

April 13, 2020
Remote working is rapidly increasing in current pandemic situation but every remote connection creates a new access point that hackers can exploit. What can you do to fully minimize the risks? Read More
Businessman hidden inside a cardboard and looking at his laptop showing how a reactive mindset is a threat to data security
Cyber SecurityInsights

How a Reactive Mindset Is a Threat to Data Security

April 8, 2020
Meeting regulatory and legal compliance standards is not enough for cybersecurity today, effective data security requires companies to have a proactive mindset to challenge, enhance and improve. Read More
Woman using smart phone in the night showing how companies should ensure secure communications with the growth in BYOD at workplace
Cyber SecurityInsights

New Working Norms Make Securing the Communications Channel a Top Priority

March 31, 2020
With the growth in BYOD, mobile messaging and a mobile workforce, companies should make it a priority to provide secure communications for data security and compliance. Read More
Laptop on home desk showing what companies must do to secure data as workers transition to working from home in a pandemic
Cyber SecurityInsights

Cybersecurity in a Pandemic: What Companies Must Do to Secure Sensitive Data and Information as Workers Transition to Working From Home

March 30, 2020
With millions of employees working from home in a pandemic, sound cyber and data security practices are necessary for companies to safeguard data and protect themselves. Read More
Hacker using laptop with U.S. flag in background showing the published report on the massive overhaul of U.S. cyber security policy
Cyber SecurityNews

Massive Overhaul of US Cyber Security Policy Shakes up the Landscape

March 27, 2020
U.S. Cyberspace Solarium Commission has published a 182-page report that includes broad changes to cyber security policy and 75 recommendations on cyber deterrence. Read More
Mechanics standing in front of jet engine showing the importance of data security while airline industry is transforming to cloud-based technologies
Cyber SecurityInsights

As the Airline Industry Looks to the Cloud, Data Security is Critical for Take Off

March 17, 2020
Security is one of the greatest concerns for organizations in the airline industry when adopting cloud-based technologies in their digital transformation. Read More
Blueprints on laptop showing the coronavirus situation creating an opportunity for organizations to evolve security architecture
Cyber SecurityInsights

Coronavirus as an Opportunity to Evolve Security Architecture

March 16, 2020
Coronavirus is forcing organizations to accommodate large-scale remote workforce that demanding that they look into new security architecture, processes and methodologies. Read More
Magnifying glass on laptop keyboard showing the adversary attribution approach to fight cybercrime
Cyber SecurityInsights

Uncover the Real Identities Behind Criminal Activities

March 4, 2020
Adversary attribution is one reliable and modern approach to fighting cybercrime as defending your enterprise can be easier if you know the opponents and what they know about you. Read More
Woman using fingerprint scanner showing the reasons why most modern online fraud prevention methods are falling short
Cyber SecurityInsights

Why Most Modern Online Fraud Prevention Methods Are Falling Short

February 28, 2020
Companies are constantly working on online fraud prevention methods while cybercriminals fine-tune their impersonation efforts. Find out why some of the authentication methods are falling short. Read More
Load More

Latest

Security camera lens showing end-to-end encryption feature for Ring products

Following a Year of Privacy Worries and Security Breaches, Ring Implements End-to-End Encryption

Finger pressing button on virtual screen showing cybersecurity trends

2021 Trends in Cybersecurity

Young adults on the couch using smartphones showing privacy policy update for WhatsApp

WhatsApp Clarifies New Privacy Policy Update, Says That Data Sharing With Facebook Will Be Limited To Communication With Businesses

Young man playing game at home showing gaming companies at risk due to stolen employee credentials

Stolen Employee Credentials Put Leading Gaming Companies at Risk of Severe Cyber Attacks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results