El Diario del CISO El Diario del CISO (The CISO Journal) Edición 30 | Page 10

Securitybrief GDPR compliance: Looking beyond the hype Facebook breach: Ready for the coming phishing wave? More OT devices added to Tenable's industrial security offering New online tool helps organisations evaluate security maturity Pseudo-ransomware Xbash targeting Linux and Windows discovered Research finds majority of businesses failing to comply with GDPR ETCISO 3.2 Bn data records compromised worldwide in the first half of 2018: Report apple: Secret, no more: Apple's new privacy portal shows what user data it keeps EU states push for sanctions for cyber attackers Hacked, scammed and on your own: navigating cryptocurrency 'wild west' Prompt action of police helps cyber fraud victims get refund from banks Welivesecurity Facebook downgrades victim count, nature of data stolen more sensitive GreyEnergy revealed as successor to BlackEnergy GreyEnergy revealed as successor to infamous BlackEnergy APT group Preparation, planning and practice can make all the difference Scams and flaws: Why we get duped and how we can avoid them VestaCP compromised in a new supply-chain attack ITSecurityguru 83 percent of UK consumers unsure of fintech, according to wide-ranging survey BSIMM9 Study Highlights Impact of Cloud Transformation and Growth of Software Security Community Cyber security tales of terror that are sure to make your skin crawl Janrain Survey Shows Consumers Still Trust Brands but Want More Control over Data One Identity Global Survey Shows Organisations Continue to Struggle to Get Basic Identity and Access Management Best Practices Right, Potentially Exposing Them to Security Risks Surge in Facebook hacking: Six cases in two days Securityreading Critical Flaw in Libssh Allow Attackers to Bypass Authentication and Gain Administrative Access Critical Flaw in Tumblr may have Exposed User Data Critical Flaws was Discovered in Diesel Engine Controllers by Auto Maskin GreyEnergy Threat Group Targets Critical Infrastructure in Poland and Ukraine Over 35 Million US Voters Records Discovered for Sale Computerweekly IoT firms sign up to UK security code of practice C-suite needs to drive outcomes-based security Forbes Cybersecurity And The Human Element: Creating Realistic Solutions For A Safer Digital World Cybersecurity Needs Women: Here's Why Cybersecurity Procedures: Six Approaches For Improving Employee Buy-in How Big Of A Role Will AI Have In Cybersecurity Over The Next Decade? What Are The Biggest Cyber-Security Trends Of 2018? RSAconference 15 Years of National Cyber Security Awareness Month Options Abound for Cyber Security Jobseekers, but Finding the Right Fit Takes Work