CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
IoT
Random
  • Latest
  • Oldest
  • Random
  • A to Z

IoT

Virtual global network map showing the growing IoT-based DDoS attacks that make use of common vulnerabilities
Cyber SecurityNews

IoT-Based DDoS Attacks Are Growing and Making Use of Common Vulnerabilities

March 25, 2020
DDoS attacks on IoT devices continue to grow with report showing an increasing trend in using WS-Discovery (WSD) to amplify the effectiveness of attacks by up to 95%.
Read More
Hand installing chip into a socket on the circuit board showing device security
Cyber SecurityInsights

Why Product Testing Is the First Step in Device Security

February 23, 2022
The future of device security isn't in dramatically expanding budgets and adding to product costs. Rather, it's getting smarter about what to test, when to test it, and how to keep devices and customers safe.
Read More
Woman with virtual logo of a smart home showing how ensure IoT devices in smart houses are compliant to CCPA
Data PrivacyInsights

A New Firewall – Multifamily Data Privacy and Security in the Age of Smart

April 9, 2020
The development of smart apartments in U.S. has led to more IoT devices and data, providers need to know what it takes to stay compliant to data protection laws like CCPA.
Read More
China flag on the circuit board showing TikTok ban is just one concern with Chinese IoT
Cyber SecurityInsights

Life After TikTok: Why Chinese IoT Is the Next Tech Battleground

October 5, 2020
The surveillance concerns surrounding TikTok are legitimate, yet they are no more legitimate than the spyware potential of countless Chinese IoT devices.
Read More
Hacker using malicious code showing effect of Ripple20 and need for Zero Trust
Cyber SecurityInsights

How to Combat the Crippling Effect of Ripple20

October 22, 2020
Since patching is problematic and traditional perimeter security is ineffective for Ripple20 vulnerabilities, Zero Trust security may be the right answer.
Read More
Woman touching 5G logo on virtual screen showing the importance of IoT security in 5G networks
Cyber SecurityInsights

Securing IoT in a 5G World

March 27, 2020
5G networks are exciting and open the door to many new possibilities for IoT, however it also comes with security risks as manufacturers rush to dominate the new untapped market their devices.
Read More
IoT showing smart information and supply chains
Cyber SecurityInsights

Securing Entire Supply-Chains in Preparation for an IoT Future

May 13, 2022
The importance of creating an interconnected security infrastructure for IoT is crucial. In a world where everything is communicating with everything else it is not just business critical but vital that everything from smart city networks down to individual smart devices is secure.
Read More

Latest

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results