CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
National Security
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

National Security

Image of woman wearing boxing gloves representing the fight in the recent U.S. vs Apple case
Data PrivacyInsights

The Recent US v. Apple Case in Context (Part I)

May 21, 2016
In the first part of a three part series of articles, Pauline C. Reich, Professor and Director of the Asia-Pacific Cyberlaw, Cybercrime and Internet Security Research Institute at Waseda University School of Law in Tokyo, Japan gives some context to the recent US v. Apple case. Read More
Image of crowd crossing a busy road junction representing the questionable actions by good organizations for the greater good
Data PrivacyInsights

The ‘Greater Good’ – When Good Organisations Do Questionable Things

June 21, 2016
Are individuals more likely to allow use of their data when it’s ‘for the greater good’ – even if permission is not sought? It may be that they don’t have a choice. Even as data protection measures increase and regulatory bodies increase their ability to punish bad behaviour by data custodians, there are still some thorny issues when it comes to the moral and legal obligations governing the sharing of Big Data and personal information. Read More
Image of police officers in riot gear representing government control in the context of the recent U.S. vs Apple case
Data PrivacyInsights

The Recent US v. Apple Case in Context (Part III)

July 23, 2016
In this, the third of a series of articles, Pauline C. Reich examines how Asian countries are approaching the thorny issue of cybercrime and the interception of data. The author takes a look at two Southeast Asian countries in particular, Cambodia and the Philippines. Read More
Image of warming sign on wall representing government surveillance and the consideration of security and privacy
Data PrivacyInsights

Government Surveillance, Security and Privacy: Does Security Always Win? (Part I)

January 25, 2017
In this first part of a two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this first part, we explore how serious the threat of cyber snooping by government surveillance is and why we shouldn’t panic just yet. Read More
Image of police in riot gear representing government surveillance and the impact on security and privacy
Data PrivacyInsights

Government Surveillance, Security and Privacy: Does Security Always Win? (Part II)

January 25, 2017
In this two-part series, we explore some of the issues around government surveillance and the search for that elusive balance between security and privacy. In this second part, we look at the search for that digital ‘safe place’ where privacy is assured and just why that place is becoming ever more elusive. Read More
A large nuclear power station on the U.S. power grid by a river at dusk
Cyber SecurityNews

Russian Hackers Meddling with U.S. Power Grid Poses Huge Threat to National Security

July 30, 2018
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos. Read More
Military soldiers training in military camp showing how civilian technology can have an impact like the Strava heat map incident
Cyber SecurityInsights

Strava Heat Map Incident: How Civilian Technology in Military Settings Needs to Be Controlled

August 29, 2018
As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings. Read More
View of mainframe in data center showing cyber vulnerabilities uncovered by GAO audit
Cyber SecurityNews

GAO Audit Uncovers Cyber Vulnerabilities in Pentagon Weapons Systems

October 20, 2018
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security. Read More
Satellite dish telecom network at sunrise showing Huawei cyber security push
Cyber SecurityNews

Huawei Cyber Security to Undergo Major Boost in the Face of Global Criticism

January 24, 2019
Though the company is coming off of its best year ever, Huawei cyber security is set for a big boost in 2019 to allay concerns in Western countries about the security of their hardware. Read More
Downtown skyline of Seoul, South Korea with Seoul Tower showing the cyber attack on the South Korea defense agency
Cyber SecurityNews

Lessons for Organizations from the South Korea Defense Agency Cyber Attack

January 26, 2019
A major cyber attack on South Korea is usually not a stop-the-presses global news item; it's fairly routine for North Korea and China to make attempts. But what's interesting are the organizational failures that this cyber attack highlights. Read More
Load More

Latest

Network digital hologram on city background showing negative view of Big Tech

New Polling Reveals Increasingly Negative Views of Big Tech, Strong Public Support for Regulation

White steam flows from the huge cooling towers at power plant showing need to secure critical national infrastructure

Securing the Devices That Underpin Our Critical Infrastructure

Technology screen with abstract network patterns over downtown San Francisco skyscrapers showing net neutrality challenge by Internet providers

2018 California Net Neutrality Law Finally Clear to Be Enforced in Wake of Unsuccessful Challenge by Internet Providers

Developer coding at night showing application security issues

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results