CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Breach Response
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Breach Response

Businessman inside a shield dome during a storm showing the need to have a good crisis plan to manage threats
Cyber SecurityInsights

Can a Crisis Plan Be a Greater Threat Than a Data Breach?

December 2, 2019
Reputational damage from data breaches are driven by social media at a frighteningly fast pace, thus it’s vital for organizations to build a crisis plan that is ready for the current digital age.
Read More
F1 crew practising at pit stop showing how to test incident response plan to ensure consistency and repeatability
Cyber SecurityInsights

Trial Before the Fire: How to Test Your Incident Response Plan to Ensure Consistency and Repeatability

October 23, 2019
Many organizations go through great lengths to set up effective security operations incident response plans but do they test them to assess effectiveness and make continuous improvements?
Read More
Karate man breaks wall showing Israel's cyber response using missile strike
Cyber SecurityNews

What Does Israel’s Missile Strike on Hamas Hackers Mean for Military Cyber Response?

May 14, 2019
Israel's cyber response to cyber attacks launched by Hamas was to launch an air strike on a building known to be the cyber HQ for Hamas. It is believed to be the first time any military has responded to a digital threat with immediate force.
Read More
Hacker looking smug and standing with arms crossed showing the need for faster cyber response
Cyber SecurityNews

Hacks Are Happening Faster: How Much Do Cyber Response Times Need to Improve?

March 6, 2019
Russian state-sponsored hackers take 19 mins to break into a network. All of this means that even SMEs need to have a cyber response capable of keeping up with these advanced threat actors.
Read More
Man looking at screen with data analytics and insider threat intelligence
Cyber SecurityInsights

Analytics, Intelligence & Response: Getting Ahead of the Insider Threat in 2019

February 20, 2019
User activity monitoring and insider threat detection is evolving to get ahead of the ever increasing threat to user data. Providing advanced analytics, insightful intelligence, and effective response mechanisms, it addresses three critical components of data security in 2019.
Read More
Portrayal of a city destroyed by tsunami waves showing need for effective business continuity plan
Cyber SecurityResources

Creating an Effective Business Continuity Plan

February 1, 2019
Just like any business plan, a business continuity plan is incredibly important to make sure your business continues to functions optimally after facing a disaster scenario. Learn the six steps for a effective BCP.
Read More
Rescue team making recovery efforts after earthquake showing importance of data recovery and protection planning
Cyber SecurityInsights

Defending Key Assets via Data Recovery and Protection Planning

November 13, 2018
Data recovery and protection planning is a crucial task and responsibility for any data center manager, and it is important in creating buoyant infrastructures. What are the crucial steps to formulate an effective plan?
Read More
Press and media camera video photographer at press conference showing the need to protect corporate reputation with effective data breach response
Cyber SecurityInsights

Protecting Corporate Reputation Through Data Breach Response

October 17, 2018
Data breach events are a now harsh reality. But when managed properly and communicated strategically, companies can emerge with both their corporate reputation and the confidence of their consumers intact. Find out how in this in-depth article.
Read More
Google Corporate Headquarters and Logo at googleplex showing concerns of Google data breach and silicon valley privacy practices
Data PrivacyNews

Google Data Breach Raises New Concerns About Silicon Valley Privacy Practices

October 13, 2018
Google admitted that back in March 2018, it became aware of a data breach that may have impacted up to 500,000 users, but failed to disclose it to users or regulators. Are big Silicon Valley tech giants are “too big to trust”?
Read More
Selective focus on keyboard with magnifier searching concept in dark low key night tone
Cyber SecurityInsights

Importance of Using SIEM for GDPR Compliance

May 24, 2018
A Security Information and Event Management (SIEM) can play an important role in GDPR compliance. It can serve as a centralized point for all data collection and analysis, and offer intelligent insights into malicious behavior so you can be alerted of security incidents before they become an impactful data breach.
Read More
Load More

Latest

EU flag on a black keyboard showing EU law for CSAM scanning of encrypted messages

Proposed EU Law Requiring CSAM Scanning Could Put an End To Encrypted Messages

Digital world and data transmission on laptop showing digital transformation and data strategy

DX 2.0 Demands a Sustainable and Secure Data Strategy

Binance mobile app on smartphone screen showing sharing of user data with Russian FSB

Report Says Text Messages Indicate Binance Shared User Data With Russian FSB

Woman in front of modern graphic interface showing data ecosystem and data governance

How the Modern Data Ecosystem Broke Data Governance

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results