El Diario del CISO El Diario del CISO (THE CISO JOURNAL) EDICIÓN 2/19 | Page 6
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
Cybertalk
Cities as cybersecurity targets
Education sector is becoming an attractive target for hackers
FaceTime bug prompts Apple to close down group chats until fixed
Three trends for CISOs to keep in mind
Healthdatamanagement Information-age
Security remains a top concern for
healthcare IT professionals
Why many cybersecurity programs
fall short on protection CEOs and cyber security: are they
the weakest link?
How deception changes the rules of
engagement in cyber security
Healtcareinfosecurity
US citizen leaks data of 14,200 HIV+ patients in Singapore
Securityintelligence
Attack Campaign Targets Linux Servers to Install New SpeakUp Trojan
Apple Slams Facebook for Monitoring App Given to Minors
HIV Data Exposed Online
Other News
Break Through Cybersecurity Complexity With New Rules, Not More Tools
Cybercriminals Generated $56 Million Over 12 Years From Monero Crypto-Mining
Malware
Geodo Botnets Using New Spam Campaign to Deliver Qakbot Malware
2018 Trends Overview: Compliance, Privacy and Security Family Tree
250 Webstresser Users to Face Legal Action
5 Common Cyber Security Threats That Bypass Legacy AV
5 Reputational Risk Predictions for 2019
Social Engineering Testing: Why Getting Hacked Is a Security Advantage
7 cybersecurity startups to bet your career on in 2019
Forbes
8 technologies that an organization can adopt to help address its cybersecurity
challenges
Cybersecurity Decision Makers Viewed As Police Or Doom Mongers By Colleagues
CISO Liz Joyce: Cybersecurity leadership requires more than technical chops
Mac Users Being Targeted By A Sneaky Image-Based Malware Attack
CISO series: Talking cybersecurity with the board of directors
Raising Trust In Security And Privacy In A Distracted World
Cyber insurance adoption lags as businesses require convincing
The Largest Security Risk To Your Organization, And How To Fix It
Cyber Risk Challenges: Are You Ready?
Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy
Cybersecurity in Manufacturing: Targeting Trade Secrets and New Technology
Cybersecurity isn’t just for ‘tech people’ anymore. Here’s why.
Securereading
Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows
Four Ways to Curtail Insider Cybersecurity Threats
Facetime Bug Allows you to Hear the Audio even before Accepting the Call
New Collection of Databases containing 2.2 billion records Discovered on Hacker Forums Hacker, cybersecurity CEO shares story in 'Breaking and Entering'
Hidden Casualty of the Shutdown: America’s Cybersecurity
Over 9000 Cisco RV320 and RV325 Routers Vulnerable to Attacks
Hospitals to medtech: Clean up your cybersecurity act
State Bank of India Data Leak Exposed Financial Details of Millions of Customers
How a piece of Brazilian malware became a global cybercrime export
How to Grow the Next Generation of Cybersecurity Talent
Databreachtoday
How to protect yourself this Data Privacy Day
Apple Rushes to Fix Serious FaceTime Eavesdropping Flaw
How to start a cybersecurity program (or restart one that lapsed)
Fileless Malware: What Mitigation Strategies Are Effective?
Improving Cybersecurity Means Taking More Care with What We Digitize
New Medical Device Cybersecurity Framework Unveiled
Intelligence Chiefs Expect More Cyberattacks Against US
Is cybersecurity more important than cost, schedule or performance?
Focal-point.com
Japan’s IoT Security Strategy: Break Into Devices
Managing your cyber-security as an SME
2018 in Review: A Year of Internal Penetration Testing
Meet the hacker mom big companies hire for cybersecurity
Prevention Is the Best Medicine: A Guide to SAP Security Health Checks
New Mac malware aims to steal credit card credentials and passwords
Understanding the Differences between PIAs and the GDPR's DPIAs
On Data Privacy Day, here's a reminder that you have none
Orange Buys UK's Largest Independent Cybersecurity Company, SecureData
ITspmagazine
OSFI Releases Advisory on Technology and Cybersecurity Incident Reporting
Obligations
Cybersecurity as a Branding Value for Companies. It is not a cost, it is an investment.
Pentagon's Cybersecurity Found Unable to Stay Ahead of Attackers
Data Privacy Day 2019
Potential global cyber attack could cause $85 billion-$193 billion worth of
Operationalizing IoT Security Using The OWASP Top 10 Project
damage: report
Dataprivacyandsecurityinsider
Report: San Antonio could be 'global industry leader' in cybersecurity, IT
Report: San Antonio’s cyber, IT firms hurting for trained workers
Data Privacy & Security Considerations in Mergers & Acquisitions Due Diligence
Senators ask Trump administration how badly shutdown hurt federal
Privacy Tip #175 – Data Privacy Day
cybersecurity
Sammamish, Washington Declares Emergency After Ransomware Attack
Siri Shortcuts can be abused for extortion demands, malware propagation
The Biggest Data Breaches in Asia 2019
Techrepublic
The C-suite could be the blind spot in your cyber security strategy
The Critical Role of Cybersecurity in Keeping Public Works Operational
How to stay safe from Super Bowl-related cybersecurity risks
The Internet of (Wonderful and Scary) Things
Top 5 ways people are okay sharing data
Things CISOs Should Keep in Mind, for 2019
Too few cybersecurity professionals is a gigantic problem for 2019
Computerweekly
True Colors of Cyber Security Podcast
Cyber insurance uptake growing, but not all firms convinced
Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks
Massive uptick in cyber attacks targeting Student Loans Company
Vulnerability Summary for the Week of January 21, 2019
Why Controlling Time Matters
Why Cybersecurity is Essential to an Organization
Your must-have IoT security checklist: ENISA’s online tool for IoT and Smart
Infrastructures Security
www.cisos.club
[email protected]