![CPO Magazine](https://thesecurefamily.com/wp-content/uploads/2021/09/avatar_user_12_1631081961-210x210.jpg)
CPO Magazine
contributor
- Total Post (1110)
- Comments (47)
Articles By This Author
![](https://thesecurefamily.com/wp-content/uploads/2022/12/researchers-discover-schoolyard-bully-android-malware-stealing-facebook-logins-of-300000-users_1500-400x400.jpg)
Researchers Discover ‘Schoolyard Bully’ Android Malware Stealing Facebook Logins of 300,000 Users
- By CPO Magazine
- . December 14, 2022
Security researchers at mobile security company Zimperium discovered an Android malware variant on Google Play Store and third-party app stores targeting the victims’ Facebook logins.
![](https://thesecurefamily.com/wp-content/uploads/2022/12/lessons-brands-can-learn-from-midterm-election-disinformation_1500-400x400.jpg)
Lessons Brands Can Learn From Midterm Election Disinformation
- By CPO Magazine
- . December 14, 2022
In the weeks leading up to the midterm elections, two public service announcements issued by the FBI and CISA warned of potential threats to election
Expert Cybersecurity Predictions for the Next 5 Years
- By CPO Magazine
- . December 14, 2022
Looking towards the next 5 years, it’s not just network servers, money, or data we need to be concerned about in the cybersecurity space —
![](https://thesecurefamily.com/wp-content/uploads/2022/12/chinese-hackers-believed-to-be-behind-security-breach-at-amnesty-international_1500-400x400.jpg)
Chinese Hackers Believed To Be Behind Security Breach at Amnesty International
- By CPO Magazine
- . December 13, 2022
Canada’s branch of Amnesty International is reporting that an early October security breach of the organization’s IT infrastructure has been traced back to state-sponsored Chinese
DoD to Migrate from Traditional Network Security to Zero Trust Architecture by 2027
- By CPO Magazine
- . December 13, 2022
The Department of Defense (DoD) published the Zero Trust Strategy and Roadmap document for migration to zero trust architecture from the traditional network security strategies
![](https://thesecurefamily.com/wp-content/uploads/2022/12/millions-of-dollars-in-covid-benefits-likely-stolen-by-chinese-hackers-says-us-secret-service_1500-400x400.jpg)
Millions of Dollars in Covid Benefits Likely Stolen by Chinese Hackers, Says US Secret Service
- By CPO Magazine
- . December 13, 2022
Foreign theft of US Covid benefits is a well-documented issue at this point, but to date most of this was presumed to be the work
![](https://thesecurefamily.com/wp-content/uploads/2022/12/5-information-security-quick-wins-for-smbs_1500-400x400.jpg)
5 Information Security Quick Wins for SMBs
- By CPO Magazine
- . December 13, 2022
According to Gartner, the volume of cyberattacks increased over 100% in Europe, East Asia, and Latin America in October and November 2020. Canada and Germany
![](https://thesecurefamily.com/wp-content/uploads/2022/12/software-may-be-eating-the-world-and-your-it-budget_1500-400x400.jpg)
Software May Be Eating the World and Your IT Budget
- By CPO Magazine
- . December 13, 2022
The Software-as-a-Service market continues to explode as enterprises increasingly adopt cloud-based applications to fuel business growth. According to a 2022 State of SaaS Management Report
![](https://thesecurefamily.com/wp-content/uploads/2022/12/apple-to-add-end-to-end-encryption-to-icloud-backups_1500-400x400.jpg)
Apple to Add End-to-End Encryption to iCloud Backups
- By CPO Magazine
- . December 12, 2022
One of the few significant holes in Apple’s end user security is set to be addressed, as Cupertino has announced plans to introduce end-to-end encryption
![](https://thesecurefamily.com/wp-content/uploads/2022/12/major-android-security-leak-manufacturer-signing-keys-used-to-validate-malware-apps_1500-400x400.jpg)
Major Android Security Leak: Manufacturer Signing Keys Used To Validate Malware Apps
- By CPO Magazine
- . December 12, 2022
A security leak involving manufacturing keys from major device producers (such as LG and Samsung) has created a path for malware apps to make it