El Diario del CISO El Diario del CISO (The CISO Journal) Edición 11 | Page 6

News0 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader International InfoSec & Cybersecurity News Flipboard Breached in Nine-Month Raid - Infosecurity Magazine #Infosec19 Dark Web Sales Offer Network Access for $10,000 #Infosec19 Video Panel: Language of Cyber #Infosec19: Former Lloyd’s CEO Says Collaboration is Key to Future of Cyber Insurance #Infosec19: Identify and Protect your Very Attacked People #Infosec19: Infosecurity's Second State of Cybersecurity Report, Available Now #Infosec19: Security Must Support Digital Transformation & Enable the Business #Infosec19: Shake Up Cybersecurity Training to Keep Ahead of Hackers #Infosec19: Winners of European Security Blogger Awards Announced 25% of Workers Would Give Away Data for £1000 AI Is "Fundamental" to Future of SME Cybersecurity Australian Police Collect 9K+ Docs in ABC Raid Complex Legacy IT Problems Can't Be Solved with Simple Solutions Confusion Reigns as C-Suite Bemoan Lack of Security Resources Cybersecurity Jobs Added to Government's Shortage Occupation List Cybersecurity: Lessons from Israel DNS rebinding attacks could hit billions of IoT devices Drone Use on the Rise, Public Safety at Risk Entrust Datacard Closes on Thales’ nCipher Security ESET Exposes Turla Malware Attacks on European Diplomats Fines Increase & Enforcements Fall in First Year of GDPR GandCrab Campaign Attacks MySQL Servers GateHub Users Lose $9.7m to Hackers Healthcare Orgs Hit with Destructive Attacks Interview: Dame Inga Beale, Former CEO, Lloyd’s of London Interview: John Merrill, CEO, DigiCert Japan to Restrict Foreign Tech Investment on Security Fears Nearly Half of Phishing Attacks are Polymorphic New Adware Found in 200+ Google Play Apps NSA Warns Windows Users to Upgrade, STAT Over Half of UK Firms Failing on Privacy Compliance Privacy Commissioner Slams Cathay Over Breach Pro-Iran Campaign Spread Fake News During Mid-Terms Report: 50% Increase in Exposed Data in One Year Researchers Find 40,000+ Exposed Containers Online Sextortion Scammers Pose as Corrupt CIA Agents The Changing Face of Cybersecurity: Protecting Consumers and SMEs UK Hasn't Made Sufficient Progress in National Security Strategy UK Universities Facing Daily State-Sponsored Attacks What to Pay for Cybersecurity Professionals? – Cyber Defense Magazine Collecting Threat Intelligence in Cyber Defense Cybersecurity Jobs in the Private vs. Public Sector Departing Employees: A Bigger Threat than Hackers Don’t Get Caught by Ransomware Get Cyber Resilient! Join Kevin Mitnick’s Live Webinar on OSINT and How it’s Used Against You How Security Automation Mixed With an IT Culture Shift Can Prevent Data Leakage from Misconfigured Servers Open Source Intelligence (OSINT): Your Public Frenemy Proxy vs. API CASB: An Overlooked Choice in Cloud Security Safeguarding Your Organization from Attacks via Your Third-Party Vendors Security for Your Holidays Security Forecast: Cloudy with a chance of doom! Snapchat staff used internal tools to spy on users The ‘BlueKeep’ Vulnerability: Keeping Your Systems Secure The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them Three Cyber Attacks on the Rise According To New Research WMD vs. Cyber Attacks: Similarities Suggesting a Cyber Arms Race Nearly 12 million Quest Diagnostics patients affected by data breach - Help Net Security 2018 in numbers: Data breaches cost $654 billion, expose 2.8 billion data records in the U.S. A veteran's look at the cybersecurity industry and the problems that need solving Advancing transparency and accountability in the cybersecurity industry An intelligence-driven approach to cyber threats BlueKeep RDP flaw: Nearly a million Internet-facing systems are vulnerable Criminals are selling hacking services targeting world’s biggest companies Critical Exim flaw exploitable locally and remotely, patch ASAP! Despite disclosure laws, cybercrime may be widely underreported Embrace chaos to improve cloud infrastructure resilience Global communications service providers struggling to fend off growing number of DDoS attacks Growing reliance on open source libraries leaves many companies vulnerable Hack The Sea: Bridging the gap between hackers and the maritime sector How can we give cybersecurity analysts a helping hand? How likely are weaponized cars? How many adults trust companies with their personal data? How much do you know about your invisible workforce? How organizations are managing vulnerability risks How privileged insiders threaten the security of global organizations Industrial cybersecurity strategies need a radical rethink and should be built from the ground up IoT cyberattacks are the new normal, the security mindset isn't Is AI fundamental to the future of cybersecurity? Is your private equity firm exposed to these hidden IT risks? Majority of CISOs plan to ask for an increase in cybersecurity investment Most global workers noticed stricter policies at work as a result of GDPR New initiative aims to strengthen IoT security, interoperability and reliability Poor data management can cost organizations $20 million each year Researchers fight ransomware attacks by leveraging properties of flash-based storage Researchers spot manipulated photos and video using AI-driven imaging system Scientists uncover vulnerability in FPGAs, affecting cloud services and IoT Security overconfidence and immaturity continue to endanger organizations Structural integrity: Quantifying risk with security measurement Trust nothing: A life in infosec is a life of suspicion Two-thirds of iOS apps don't use App Transport Security Unclassified data creates security blind spots for most companies Why zero trust is crucial to compliance Will biometrics replace passwords for online payment authentication? Workforce diversity key to plugging the IT skills gap Cyber crime widely under-reported, Isaca study shows - ComputerWeekly 2.3 billion business and consumer data files exposed online A lack of skills and ownership are top challenges to OT security Beware of security blind spots in encrypted traffic Business leaders failing to address cyber threats Cyber weapons readily available to criminals, researchers warn Digital transformation an opportunity for security DNS – a security opportunity not to be overlooked, says Nominet Firms face targeted bespoke cyber attacks, dark web study reveals Hackers targeting UK universities a threat to national security Legacy IT systems a significant security challenge London could be world cyber risk leader, says ex-Lloyd’s chief National Cyber Security Strategy mostly failing, says PAC report