CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Sovereignty
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Sovereignty

Vietnamese drinking coffee on the sidewalk and using mobile phones
Cyber SecurityNews

Vietnam’s New Cybersecurity Law and Push for Internet Sovereignty Reduces Freedom

July 20, 2018
Vietnam's new cybersecurity law strengthens internet sovereignty and national security at the expense of increased censorship and reduced freedom of speech.
Read More
Image of highways over a China city representing China's cybersecurity law driving towards cyber sovereignty
Cyber SecurityInsights

China’s Cybersecurity Law Pushes Cyber Sovereignty Vision

January 8, 2018
For years, China has used the World Internet Conference to advance its vision for cyber sovereignty. Now it looks like the various ideas and concepts, including the new Cybersecurity Law, undergirding this vision are starting to be put into effect for China’s Internet, with unknown implications.
Read More
Image of high speed network connections through a city representing data flow and how civil society is annoyed
Data ProtectionNews

Civil Society Annoyed at Being Sidelined in Major EU Data Flow Conference

July 19, 2017
Estonia takes over presidency of EU and hosts major Digital Single Market conference on free movement of data, touching on data flow and data localization.
Read More
Image of man flying among clouds representing data protection regulations from cloud technology perspective
Data ProtectionInsights

Dawn of Data Protection Regulations: Will You Be a Hero or a Villain?

April 19, 2016
Like Superman draws his power from the sun, the cloud imbues organisations with remarkable power and flexibility. But how should organisations wield such power effectively to protect their users and data, especially in light of data protection regulations? Matthias Yeo, APAC CTO of Blue Coat, shares the top 3 tenets of adopting a cloud strategy so you can be the hero, not the villain.
Read More

Latest

Side view of laptop on desktop with digital emails showing accidental data loss

Nearly 60% Of Organizations Suffered Accidental Data Loss via Email in Last 12 Months

Developers writing code showing secure applications and API security

Consumers Understand the Implications of and Are Willing To Pay For Secure Software

Hand taking dollar from pile illuminated by red light showing ransomware attacks down due to ransom payments

NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments

Happy woman shopping showing credit card data stolen from online checkout using PHP code

FBI: Hackers Injected Malicious PHP Code Into Online Checkout Pages to Scrape Credit Card Data

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results