CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Threats
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Threats

Image of man flying among clouds representing data protection regulations from cloud technology perspective
Data ProtectionInsights

Dawn of Data Protection Regulations: Will You Be a Hero or a Villain?

April 19, 2016
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
Read More
Image of woman holding credit card in front of laptop representing how online retailers are preparing for the holiday hacking season
Cyber SecurityInsights

Online Retailers Brace for the Holiday ‘Hacking’ Season

October 18, 2016
The holiday season in 2016 will see many of these large enterprises up their game in terms of protecting customer data. It’s not as if they have much choice, data breaches in the past have reduced public trust in online retailers – but the latest approaches to ensuring data security go some way to restoring that trust.
Read More
Image of woman using credit card for online shopping representing the season for cyber attack
Cyber SecurityInsights

Cyber Attack Season

November 25, 2016
In this second part of a two part series we will be taking a look at how online retailers are taking steps to mitigate against the almost inevitable threat to data from hackers that seems part and parcel of the holiday buying season.
Read More
Image of businessman holding mobile phone representing the security menace of mobile communication devices for business executives
Cyber SecurityInsights

The Mobile – Miracle Communication Device or Executive Security Menace?

February 22, 2017
Mobile smartphone usage is now reaching saturation point in the developed world. Increasingly mobile phones are becoming (or have become) indispensable business tools as well as powerful communication devices. However, with great power comes great responsibility – something that seems to have escaped U.S. President Donald Trump who is still using a legacy Android device. In this article we examine just why mobile devices present massive challenges when it comes to data security – and why business users need to be vigilant.
Read More
Image of man using industrial tool representing industrial control systems (ICS) security
Cyber SecurityInsights

Dismal Future for Industrial Control Systems (ICS) Security

December 21, 2017
What some are calling ‘Industrie 4.0’ or the Smart Factory has become a reality, and has accelerated the digital transformation in the industrial sector. This increased reliance on digital systems has led to an increased emphasis on industrial control systems (ICS) security in the manufacturing sector.
Read More
Image of jackpot machine signifying the new security scare of jackpotting attacks on ATM machines
Cyber SecurityNews

The New Security Scare: Jackpotting Attacks on ATM Machines

February 5, 2018
ATM machines have always represented a “soft target” in the minds of criminals. What’s now clear is that the ATM card skimmer scams of years past pale in comparison with what’s possible now with jackpotting scams with cyber criminals turning every ATM they visit into casino slot machines with huge jackpots.
Read More
Rear View Of A Hacker Using Multiple Computers
Cyber SecurityNews

New Government Reports Shows Federal Agencies Facing Significant Cyber Security Risks

June 18, 2018
New report shows nearly 75 percent of U.S. federal agencies are still woefully unprepared and deemed to be “at risk” or “at high risk” of a cyber attack.
Read More
DevOps engineer working with computer on software infrastructure
Cyber SecurityInsights

VMs, Containers and Unikernels? Time to Upgrade Your Software Infrastructure Security

July 19, 2018
Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.
Read More
A large nuclear power station on the U.S. power grid by a river at dusk
Cyber SecurityNews

Russian Hackers Meddling with U.S. Power Grid Poses Huge Threat to National Security

July 30, 2018
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos.
Read More
Finger pressing a push button to start an autonomous vehicle and shows the threat of hacking
Cyber SecurityInsights

Autonomous Vehicles and the Threat of Hacking

October 1, 2018
With autonomous vehicles gaining mainstream attention, the challenges that come with the tech are being scrutinized. The biggest of these is the threat of hacking.
Read More
Load More

Latest

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

Taylor Swift on stage showing bot attack on Ticketmaster

Ticketmaster Says Bot Attack Is To Blame for the Misfortunes of Taylor Swift Fans

Man check mark on document showing privacy notices and consent forms

Privacy Notices and Consent Forms: Why, Even Though They Are Unwieldy, They Will Most Likely Stay With Us in the Years To Come

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Facebook
See all results