CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
  • See all results
Home
Encryption
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Encryption

Close up hand of cybercriminal downloading data from Marriot data breach while holding an opened lock and key
Cyber SecurityNews

Half a Billion Guests Affected by Massive Marriott Data Breach

December 3, 2018
Marriott has put half a billion guest at risk in one of the largest data breach to date. The scope of the data breach is not only startling due to the numbers of guests that have been affected, it is the sheer amount of time since 2014 that the hackers had had access to the data. Read More
Hand reaches out towards secure lock on smartphone showing Five Eyes proposal to weaken encryption
Data PrivacyInsights

Weakening Encryption Will Only Leave Us Less Secure

October 10, 2018
The Five Eyes proposal for lawful access compromises on encryption, infringes upon our right to privacy, puts our personal data at risk, and utlimately undermines public trust in technology. Read More
Hand with a key trying to open security lock on a smartphone showing Five Eyes wanting access to data from tech companies
Data PrivacyNews

Five Eyes Want Access to Data from Tech Companies

September 21, 2018
The Five Eyes has put the tech industry on notice. They want access to data from tech companies and while there is no formal demand for encryption backdoors, the Five Eyes believe government agencies should have access to encrypted information. Read More
Group of young adult friends using secure messaging app on smartphones in the subway
Data PrivacyInsights

Privacy Dilemmas of (In)Secure Messaging Apps

August 17, 2018
Secure messaging apps can provide a great means of communicating securely and privately, but there's a privacy dilemma as law enforcement and national security agencies face significant obstacles to the lawful access of communications. Read More
Uninstall Facebook app for Android smartphones from Google Play Store
Cyber SecurityInsights

What Can Businesses Learn from Facebook Stock Plunge?

August 8, 2018
Are the privacy and data misuse scandals finally catching up with Facebook stock? There are lessons every business should heed to avoid a direct and shocking blow to company value. Read More
Image of lock with bullet hole on a cell phone
Data PrivacyNews

ENCRYPT – Secure Data Act to Tackle Encryption Backdoors

June 15, 2018
Proposed Secure Data Act wants to forbid government agencies from demanding for encryption backdoors. This is a positive move but will it resolve the security vs. privacy debate? Read More
Image of man typing on laptop and sending data to cloud service providers which is protecting data
Cyber SecurityInsights

Protecting Data in 2018: What Cloud Service Providers and Customers Should Know

May 10, 2018
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs. Read More
Image of locks in a connected chain signifying the impact of blockchain technology on the future of cyber security
Cyber SecurityInsights

Blockchain and Its Impact on the Future of Cyber Security

February 14, 2018
There is reason to be optimistic about the future of cyber security. In today’s world, there is always a “weak link” in the chain that hackers can exploit. In a blockchain world, there are no longer any weak links and every action taken on the blockchain is part of a completely verifiable and trackable digital ledger. Read More
Image of a lock on computer chip signifying the use of microSD-sized computers to secure microfinance in developing countries
Cyber SecurityNews

Securing Microfinance in Developing Countries with microSD-Sized Computers

February 9, 2018
There's a need to secure offline, rather than online, microfinancing solutions. The future rests in the power of embeddable microchips and the power of process isolation by inserting a Linux-powered computer into the architecture of an non-secure IoT device to create a hardware Root of Trust. Read More
Image of a open sign on shop window representing how the end of net neutrality and the open internet will impact data privacy and cyber security
Data PrivacyNews

Why the End of Net Neutrality and the Demise of the Open Internet Could Have Unintended Consequences for Data Privacy and Cyber Security

December 18, 2017
The FCC’s historic overturning of the Obama-era Net Neutrality rules could have profound implications for the Open Internet. While there are potential censorship and service pricing implications of this move, what are the long-term impact on data privacy and cyber security? Read More
Load More

Get Connected

  • 7.9kFans
  • 12.7kFollowers
  •  Followers
  •  Subscribers

Stay Updated

Subscribe to our newsletter.

Thank you for subscribing!

Something went wrong.

We respect your privacy

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

© 2019 Data Privacy Asia Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
Start typing to see results or hit ESC to close
Regulations U.S. Cyber Threats EU GDPR Data Breach
See all results
Username
Password
Remember Me
Lost password?
Create an account
Enter username or email
Cancel