CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Data Breach Response
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Breach Response

Businessman inside a shield dome during a storm showing the need to have a good crisis plan to manage threats
Cyber SecurityInsights

Can a Crisis Plan Be a Greater Threat Than a Data Breach?

December 2, 2019
Reputational damage from data breaches are driven by social media at a frighteningly fast pace, thus it’s vital for organizations to build a crisis plan that is ready for the current digital age. Read More
F1 crew practising at pit stop showing how to test incident response plan to ensure consistency and repeatability
Cyber SecurityInsights

Trial Before the Fire: How to Test Your Incident Response Plan to Ensure Consistency and Repeatability

October 23, 2019
Many organizations go through great lengths to set up effective security operations incident response plans but do they test them to assess effectiveness and make continuous improvements? Read More
Karate man breaks wall showing Israel's cyber response using missile strike
Cyber SecurityNews

What Does Israel’s Missile Strike on Hamas Hackers Mean for Military Cyber Response?

May 14, 2019
Israel's cyber response to cyber attacks launched by Hamas was to launch an air strike on a building known to be the cyber HQ for Hamas. It is believed to be the first time any military has responded to a digital threat with immediate force. Read More
Cynet Free IR Tool
Cyber SecuritySponsored

Cynet Free IR Tool Offering Empowers Responders to Know and Act Against Active Attacks

May 8, 2019
Cynet launches free IR tool providing unmatched speed and efficiency to help organizations and IR providers accurately determine the breach scope and impact; and ensure that all malicious presence and activity are completely eliminated. Read More
Hacker looking smug and standing with arms crossed showing the need for faster cyber response
Cyber SecurityNews

Hacks Are Happening Faster: How Much Do Cyber Response Times Need to Improve?

March 6, 2019
Russian state-sponsored hackers take 19 mins to break into a network. All of this means that even SMEs need to have a cyber response capable of keeping up with these advanced threat actors. Read More
Man looking at screen with data analytics and insider threat intelligence
Cyber SecurityInsights

Analytics, Intelligence & Response: Getting Ahead of the Insider Threat in 2019

February 20, 2019
User activity monitoring and insider threat detection is evolving to get ahead of the ever increasing threat to user data. Providing advanced analytics, insightful intelligence, and effective response mechanisms, it addresses three critical components of data security in 2019. Read More
Portrayal of a city destroyed by tsunami waves showing need for effective business continuity plan
Cyber SecurityResources

Creating an Effective Business Continuity Plan

February 1, 2019
Just like any business plan, a business continuity plan is incredibly important to make sure your business continues to functions optimally after facing a disaster scenario. Learn the six steps for a effective BCP. Read More
Rescue team making recovery efforts after earthquake showing importance of data recovery and protection planning
Cyber SecurityInsights

Defending Key Assets via Data Recovery and Protection Planning

November 13, 2018
Data recovery and protection planning is a crucial task and responsibility for any data center manager, and it is important in creating buoyant infrastructures. What are the crucial steps to formulate an effective plan? Read More
Press and media camera video photographer at press conference showing the need to protect corporate reputation with effective data breach response
Cyber SecurityInsights

Protecting Corporate Reputation Through Data Breach Response

October 17, 2018
Data breach events are a now harsh reality. But when managed properly and communicated strategically, companies can emerge with both their corporate reputation and the confidence of their consumers intact. Find out how in this in-depth article. Read More
Google Corporate Headquarters and Logo at googleplex showing concerns of Google data breach and silicon valley privacy practices
Data PrivacyNews

Google Data Breach Raises New Concerns About Silicon Valley Privacy Practices

October 13, 2018
Google admitted that back in March 2018, it became aware of a data breach that may have impacted up to 500,000 users, but failed to disclose it to users or regulators. Are big Silicon Valley tech giants are “too big to trust”? Read More
Load More

Latest

Network digital hologram on city background showing negative view of Big Tech

New Polling Reveals Increasingly Negative Views of Big Tech, Strong Public Support for Regulation

White steam flows from the huge cooling towers at power plant showing need to secure critical national infrastructure

Securing the Devices That Underpin Our Critical Infrastructure

Technology screen with abstract network patterns over downtown San Francisco skyscrapers showing net neutrality challenge by Internet providers

2018 California Net Neutrality Law Finally Clear to Be Enforced in Wake of Unsuccessful Challenge by Internet Providers

Developer coding at night showing application security issues

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results