El Diario del CISO El Diario del CISO (The CISO Journal) Edición 11 | Page 9

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Cshub Zdnet 5 Most Stressful Aspects Of Cyber Security Baltimore Blames NSA For Ransomware Attack Incident Of The Week: Checkers Restaurants Details Data Breach Incident Of The Week: Millions Hit By Quest, LabCorp Data Breach Strengthening Cyber Security For ERP Applications The Case For Stronger Cyber Security Efforts In APAC Cathay Pacific's unpatched decade-old vulnerability led to 2018 breach Cybersecurity jobs: These skills are most in demand and have the best pay Cybersecurity: How to get your software patching strategy right and keep the hackers at bay Cybersecurity: You're probably over-confident about your defences or under- prepared for a breach Is your cybersecurity training reaching the right people? KrebsonSecurity Securityintelligence Gaming the System: How MMOs Can Level Up Your Cybersecurity Best Practices Interns and Social Media: A Goldmine for Hackers Security Awareness Training Without Tech Awareness Can Leave Employees in the Dark Third-Party Risks Need New Approaches Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach NY Investigates Exposure of 885 Million Mortgage Documents Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware Should Failing Phish Tests Be a Fireable Offense? Securitynow Techtarget HawkEye Malware Finds Renewed Life With Financially Motivated Actors Insider Threat: Research Proves Loyalty Can Be a Rare Commodity Mobile Fraud Is on the March, Finds New RSA Report NanshOu' China-Based Attack Uses APT-Like Techniques to Infect Servers Worldwide How does the new Dharma Ransomware variant work? Huawei ban highlights 5G security issues CISOs must tackle Microsoft issues second BlueKeep warning urging users to patch NSA issues BlueKeep warning as new PoC exploit demos Other News $74 Million Settlement of Premera Breach Lawsuits Proposed 10 Cybersecurity Quotes from SecureWorld Atlanta 12 dark secrets of encryption 4 Programming Languages Every Cyber Security Professional Must Know 5 Reasons why SMEs can’t ignore cyber security 64 percent of organizations believe they have suffered a breach due to privileged access 72 percent of cyber security professionals have considered quitting over lack of resources Alex Stamos on Content Moderation and Security Attackers Piece Together Malicious Tools Used for Targeted Attacks Auction Sees Malware Infested Computer Sell for $1.3 Million Baltimore Ataque ransomware Costeo City $ 18 millones Baltimore IT head apologizes for ransomware attack response Beyond the data breach: How retail is addressing cybersecurity BlueKeep: cybercriminals scanning for the latest Windows vulnerability Building an InfoSec Program from Scratch, Part I - Understand the Business CFOs Grapple With How Much Cybersecurity Spending is Enough China-Based Company is Believed to be Behind HiddenWasp Malware Cities Under Attack: Ransomware Continues to Plague Public Institutions Club Statement: Online Security Breach Comprehensive 2019 Email Fraud Reports Cryptocurrency Company Hacks Itself Before Hackers Can Hack It Cryptocurrency wallet GateHub hacked, nearly $10 million stolen Cyber criminals steal 113,000 data records from rivals Cybersecurity in the “When-Not-If” Era Data Privacy and Security – Happy Birthday GDPR! Its Year in Review and the Future for Data Protection DDoS Attacks on IoT. Doesn't remind you of something... ? Do personality traits matter in cyber security? Educating the Next Generation of Cyber Warriors: National Centers of Academic Excellence Celebrate 20th Anniversary > National Security Agency Email Still Major Attack Vector: Security Research Employees are almost as dangerous to business security as hackers and cybercriminals Employees beware: 33% of CEOs will fire you if you cause a cybersecurity breach Eurofins Scientific detects ransomware in some of its IT systems First American Financial Corp. Data Records Leak Fort Worth IT Professionals Fired for Reporting Cybersecurity Issues:Security Affairs Fortune 500 Company Addresses Weakness Behind 264GB Data Leak Future-Proof Your Digital Business With Zero Trust Security GDPR Anniversary: Where are we on privacy a year later? GDPR fines levied so far: The lessons businesses can learn Health Care and Manufacturing Industries Still Threatened by WannaCry HiddenWasp malware seizes control of Linux systems How to Build a Cybersecurity Career How to Protect Yourself or Your Business from Ransomware in 2 Steps How to remove BOSTON ransomware (Virus Removal Guide) In Search of Six Million Crime Stoppers Infonomics-based Model Teaches CISOs how to Assess their Data’s Financial Risk, Invest Properly in Data Security Infosec bloke claims: Pornhub owner shafted me after I exposed gaping holes in its cartoon smut platform • The Register IoT security vs. privacy: Which is a bigger issue? IT Security Vulnerability Roundup – May 2019 'IT shouldn't tell OT they have an ugly baby,' says Anglo American CISO jetlib.sec Jewish dating app JCrush exposed user data and private messages Key Findings of the Exabeam 2019 State of the SOC Report Large 'GoldBrute' RDP Botnet Hunts For Exposed Servers With Weak Passwords Leveraging Analytics for More Effective Security Performance Management Linux Targeted By Chinese Malware Dubbed "HiddenWasp" Majority of UAE residents think their smart device is spying on them Millennial Perceptions of Security: Results from a National Survey of Americans Most organizations, over-confident in their ability to stop data breaches, Centrify survey reveals Mueller Reconfirms Russian Election Interference Campaign Organizations still struggle to manage vulnerability patches, report Phishing Scams Can Now Hack Two-Factor Authentication Potential human costs of cyber operations Prevent ransomware attacks: Learn from Atlanta and Baltimore Ransomware isn’t just a big city problem Ransomware: Who’s to Blame or Not to Blame in Baltimore Attack? Researcher Posts Demo of BlueKeep Exploit of Windows Device Secret CSO: Mary Gardner, F5 Networks Security First Culture: Why it's Critical to Your Business Snapchat workers snooped on users with internal tool Taking a ‘risk-based’ approach to cybersecurity spend The Cost of Cybercrime The Cybersecurity Market Is Consolidating The Ins and Outs of Cybersecurity Insurance The security endgame: How to actively keep your data and organisation secure The US Needs an Industrial Policy for Cybersecurity This Week in Security News: Gray Alerts and Wormable Malware - Wesley Clover What corporate boards still don’t understand about cyber risk What’s the best approach to patching vulnerabilities? Would you pay $1m for a laptop full of malware? www.cisos.club [email protected]