CPO Magazine

CPO Magazine News, insights and resources for data protection, privacy and cyber security leaders

We provide news, insights and resources to help data privacy, protection and cyber security leaders make sense of the evolving landscape to better protect their organizations and customers.

The DOJ argues that consumers are being shortchanged on   and   as a result of a monopoly, even though these are two of ...
02/04/2024

The DOJ argues that consumers are being shortchanged on and as a result of a monopoly, even though these are two of Apple's primary marketing points. https://www.cpomagazine.com/data-privacy/apple-facing-justice-department-antitrust-lawsuit-consumers-shortchanged-on-privacy-and-security

The DOJ argues that consumers are being shortchanged on privacy and security as a result of a monopoly, even though these are two of Apple's primary marketing points. One specific criticism is that the company has intentionally stifled cross-platform messaging.

Personal and financial information for at least 57,000 parties doing business with Bank of America was exposed in a     ...
15/02/2024

Personal and financial information for at least 57,000 parties doing business with Bank of America was exposed in a of an insurance process management services provider in late October of last year. https://www.cpomgazine.com/cyber-security/third-party-data-breach-hits-bank-of-america-at-least-57000-records-of-sensitive-personal-information-exposed

Personal and financial information for at least 57,000 parties doing business with Bank of America was exposed in a third party data breach in late October of last year. Infosys McCamish Systems (IMS), an insurance process management services provider, is the third party that was compromised.

A Verizon insider   has impacted employee data of 63,206 employees. incident occurred when a Verizon employee violated c...
14/02/2024

A Verizon insider has impacted employee data of 63,206 employees. incident occurred when a Verizon employee violated company policy by gaining unauthorized access to a file containing workers’ personal information. https://www.cpomagazine.com/cyber-security/verizon-insider-data-breach-impacted-employee-data-of-more-than-60000-employees

A Verizon insider data breach has impacted employee data of 63,206 employees. incident occurred when a Verizon employee violated company policy by gaining unauthorized access to a file containing workers’ personal information.

According to a new joint warning published by the CISA, NSA and FBI, exploits by the Chinese   have been going on for at...
14/02/2024

According to a new joint warning published by the CISA, NSA and FBI, exploits by the Chinese have been going on for at least five years in some victim environments. https://www.cpomagazine.com/cyber-security/cisa-update-on-critical-infrastructure-compromise-chinese-hackers-have-been-lurking-in-us-systems-for-at-least-five-years

According to a new joint warning published by the CISA, NSA and FBI, exploits by the Chinese hackers have been going on for at least five years in some victim critical infrastructure environments.

Users are likely to feel uneasy about the extent of information a single   brand could possess regarding their individua...
14/02/2024

Users are likely to feel uneasy about the extent of information a single brand could possess regarding their individual preferences, raising real concerns about and data control, which in turn could affect app uptake. https://www.cpomagazine.com/data-privacy/the-great-superapp-dilemma-business-ambitions-vs-user-privacy/

Users are likely to feel uneasy about the extent of information a single superapp brand could possess regarding their individual preferences, raising real concerns about privacy and data control, which in turn could affect app uptake.

Popular remote monitoring and management software firm AnyDesk has suffered a   that compromised its production systems ...
13/02/2024

Popular remote monitoring and management software firm AnyDesk has suffered a that compromised its production systems and leaked source code and code signing certificates. https://www.cpomagazine.com/cyber-security/anydesk-cyber-attack-compromised-production-systems-and-leaked-code-signing-certificates

Popular remote monitoring and management software firm AnyDesk has suffered a cyber attack that compromised its production systems and leaked source code and code signing certificates.

Clorox reported $49 million in incremental expenses, and Johnson Controls reporting   costs of nearly $27 million. Remed...
13/02/2024

Clorox reported $49 million in incremental expenses, and Johnson Controls reporting costs of nearly $27 million. Remediation costs include third party contracting, as well as added operating costs due to disruptions. https://www.cpomagazine.com/cyber-security/2023-data-breach-cost-to-clorox-and-johnson-controls-reaches-nearly-76-million

Clorox reported a total of $49 million in incremental expenses related to the attack, with Johnson Controls reporting data breach costs of nearly $27 million. This money went to remediation costs such as third party contracting, as well as added operating costs due to disruptions.

An INTERPOL-led global   operation has taken action against 1,300 ransomware, phishing, and malware command-and-control ...
12/02/2024

An INTERPOL-led global operation has taken action against 1,300 ransomware, phishing, and malware command-and-control (C2) servers and the arrest of dozens of suspects. https://www.cpomagazine.com/cyber-security/interpol-law-enforcement-operation-synergia-shuts-70-of-1300-cybercrime-servers-nabs-31-suspects

An INTERPOL-led global law enforcement operation has taken action against 1,300 ransomware, phishing, and malware command-and-control (C2) servers and the arrest of dozens of suspects.

Hong Kong deepfake scam that netted HK$200 million used fake video conference with multiple company executives. Targeted...
12/02/2024

Hong Kong deepfake scam that netted HK$200 million used fake video conference with multiple company executives. Targeted employee reportedly did suspect fraud at first, but ended up making a total of 15 bank transfers. https://www.cpomagazine.com/cyber-security/hong-kong-video-deepfake-scam-nets-hk200-million-fraud-involved-simulation-of-multiple-video-conference-participants

A Hong Kong deepfake scam that netted HK$200 million made use of a fake video conference with multiple company executives. The employee that was targeted reportedly did suspect fraud at first, but nevertheless ended up making a total of 15 bank transfers.

With the passing of more   laws, and legislation that focuses on children’s privacy, data brokers, and hopefully, the em...
12/02/2024

With the passing of more laws, and legislation that focuses on children’s privacy, data brokers, and hopefully, the emerging trend of privacy-for-profit, the pressure to find solutions that support compliance is only going to grow.

As more states pass not just comprehensive privacy laws, but narrow legislation that focuses on children’s privacy, data brokers, and hopefully, the emerging trend of privacy-for-profit, the pressure to find solutions that support compliance, while saving resources in an unsettled market, is only ...

The   lawsuit dates all the way back to 2018, when Google internally discovered that the Google+ API was being abused. T...
08/02/2024

The lawsuit dates all the way back to 2018, when Google internally discovered that the Google+ API was being abused. The privacy lawsuit has now been settled for $350 million, after a lengthy appeals process played out. https://www.cpomagazine.com/data-protection/google-shareholders-to-receive-350-million-in-privacy-lawsuit-settlement

The privacy lawsuit dates all the way back to 2018, when Google internally discovered that the Google+ API was being abused. The privacy lawsuit has now been settled for $350 million, after a lengthy appeals process played out.

Amazon was penalized for excessive employee monitoring, insufficient data minimization, and failing to meet transparency...
08/02/2024

Amazon was penalized for excessive employee monitoring, insufficient data minimization, and failing to meet transparency and security requirements. Much of the fine centers on the hand scanners issued to warehouse employees. https://www.cpomagazine.com/data-protection/e32-million-gdpr-fine-to-amazon-for-excessive-employee-monitoring/

Amazon was penalized for excessive employee monitoring, insufficient data minimization, and failing to meet transparency and security requirements. Much of the GDPR fine centers on the hand scanners that are issued to warehouse employees.

Identity Theft Resource Center: 2023 Worst Year on Record for Number of Data Breaches
08/02/2024

Identity Theft Resource Center: 2023 Worst Year on Record for Number of Data Breaches

ITRC report noted that the 3,205 data breaches recorded last year shatters the prior record of 1,860 and is a 78% increase from a similar number (1,806) seen in 2022.

Global Affairs Canada (GAC), the country’s foreign affairs department, is reeling from the impacts of a   that leaked th...
08/02/2024

Global Affairs Canada (GAC), the country’s foreign affairs department, is reeling from the impacts of a that leaked the personal information of users and staff members.

Global Affairs Canada (GAC), the country’s foreign affairs department, is reeling from the impacts of a data breach that leaked the personal information of users and staff members.

ITRC report noted that the 3,205   recorded last year shatters the prior record of 1,860 and is a 78% increase from a si...
08/02/2024

ITRC report noted that the 3,205 recorded last year shatters the prior record of 1,860 and is a 78% increase from a similar number (1,806) seen in 2022.

ITRC report noted that the 3,205 data breaches recorded last year shatters the prior record of 1,860 and is a 78% increase from a similar number (1,806) seen in 2022.

New papers reveal the NSA regularly purchases internet data about Americans from private  , including categories that co...
07/02/2024

New papers reveal the NSA regularly purchases internet data about Americans from private , including categories that could normally only be obtained via a court order.

New papers reveal the National Security Agency (NSA) regularly purchases internet data about Americans from private data brokers, including categories that could normally only be obtained via a court order.

Energy and automation company Schneider Electric has confirmed a   attack that disrupted the Sustainability Business div...
07/02/2024

Energy and automation company Schneider Electric has confirmed a attack that disrupted the Sustainability Business division and leaked company data.

Energy and automation company Schneider Electric has confirmed a ransomware attack that disrupted the Sustainability Business division and leaked company data.

Decentralized identity, identity data engineering, and the integration of analytics and   stand as pivotal pillars that ...
06/02/2024

Decentralized identity, identity data engineering, and the integration of analytics and stand as pivotal pillars that will shape the success of strategies in the coming year.

As we step into 2024, the IAM landscape continues to evolve. Decentralized identity, identity data engineering, and the integration of analytics and generative AI stand as pivotal pillars that will shape the success of IAM strategies in the coming year.

By fostering a culture of continuous improvement that thinks outside the box of  , IT teams and security leaders can fee...
06/02/2024

By fostering a culture of continuous improvement that thinks outside the box of , IT teams and security leaders can feel confident in their resilience.

By fostering a culture of continuous improvement that thinks outside the box of compliance, IT teams and security leaders can feel confident in their cybersecurity resilience.

FTC’s new   amendments would bolster children's   by further restricting how companies can collect, use and monetize the...
05/01/2024

FTC’s new amendments would bolster children's by further restricting how companies can collect, use and monetize the data of underage users, shifting a greater deal of responsibility for privacy online to service providers.

The FTC’s new COPPA amendments would bolster children's privacy by further restricting how companies can collect, use and monetize the data of underage users, shifting a greater deal of responsibility for privacy online to service providers.

With the widespread availability of ChatGPT and other   applications today, research shows a 135% increase in ‘novel soc...
05/01/2024

With the widespread availability of ChatGPT and other applications today, research shows a 135% increase in ‘novel social engineering’ attacks in January and February of 2023 alone.

With the widespread availability of ChatGPT and other Generative AI applications today, research shows a 135% increase in ‘novel social engineering’ attacks in January and February of 2023 alone.

Embracing continuous exposure management allows businesses to proactively manage their   posture, prioritize critical ex...
29/12/2023

Embracing continuous exposure management allows businesses to proactively manage their posture, prioritize critical exposures, and maintain a comprehensive view of their attack surface.

Embracing continuous exposure management allows businesses to proactively manage their cybersecurity posture, prioritize critical exposures, and maintain a comprehensive view of their attack surface.

The future of data is not about how much we collect, but how ethically it is used and how we can realistically safeguard...
27/12/2023

The future of data is not about how much we collect, but how ethically it is used and how we can realistically safeguard it so that we get the best out of without violating data tenets.

The future of data is not about how much we collect, but how ethically it is used and how we can realistically safeguard it so that we get the best out of AI without violating data privacy tenets.

U.S. state   laws are multiplying, and both regulatory action and class action lawsuits have put companies collecting or...
20/12/2023

U.S. state laws are multiplying, and both regulatory action and class action lawsuits have put companies collecting or sharing sensitive data without consent in the spotlight.

Companies need to be more careful than ever when handling sensitive data. U.S. state privacy laws are multiplying, and both regulatory action and class action lawsuits have put companies collecting or sharing sensitive data without consent in the spotlight.

The holiday season is a time for celebrations, and unfortunately, also a prime opportunity for cybercriminals to strike....
18/12/2023

The holiday season is a time for celebrations, and unfortunately, also a prime opportunity for cybercriminals to strike. With many companies operating with reduced staff, the risk of falling victim to increases.

The holiday season is a time for loved ones and celebrations, and unfortunately, also a prime opportunity for cybercriminals to strike. With many companies operating with reduced staff and employees taking time off, the risk of falling victim to ransomware increases.

Security researchers have discovered a three-decade-old DICOM vulnerability that exposed millions of patient   to unauth...
15/12/2023

Security researchers have discovered a three-decade-old DICOM vulnerability that exposed millions of patient to unauthorized access and manipulation.

Security researchers have discovered a three-decade-old DICOM vulnerability that exposed millions of patient health records to unauthorized access and manipulation.

Australian-based American defense contractor Austal USA has confirmed a cyber attack after   group shared samples of the...
15/12/2023

Australian-based American defense contractor Austal USA has confirmed a cyber attack after group shared samples of the stolen data as proof. Austal USA undertakes major U.S. Navy shipbuilding programs.

Australian-based American defense contractor Austal USA has confirmed a cyber attack after the Hunters International ransomware group listed the company and shared samples of the stolen data as proof. Austal USA undertakes major U.S. Navy shipbuilding programs.

Comprehensive protection in the   era requires a holistic approach to network security. This involves regular inspection...
15/12/2023

Comprehensive protection in the era requires a holistic approach to network security. This involves regular inspections, meticulous prioritization of threats, and systematic addressing of vulnerabilities.

Comprehensive protection in the 5G era requires a holistic approach to network security. This involves regular inspections, meticulous prioritization of threats, and systematic addressing of vulnerabilities.

A ChatGPT   documented in a new report causes training data, some containing personal information, to randomly appear wh...
14/12/2023

A ChatGPT documented in a new report causes training data, some containing personal information, to randomly appear when one tells the chatbot to repeat a particular word.

A ChatGPT vulnerability documented in a new report causes training data, some containing personal information, to randomly appear when one tells the chatbot to repeat a particular word.

Address


Alerts

Be the first to know and let us send you an email when CPO Magazine posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to CPO Magazine:

Videos

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share