El Diario del CISO El Diario del CISO (The CISO Journal) Edición 1 | Page 4
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
International InfoSec & Cybersecurity News
What is a CISO? Responsibilities and
requirements for this vital role | CSO
Online
The chief information security officer (CISO) is the
executive responsible for an organization's information
and data security.
12 famous passwords used through the ages
2 critical ways regulations and frameworks weaken cybersecurity
2019 will be the year of cloud-based cybersecurity analytics/operations
4 tips to mitigate Slack security risks
8 phishing emails and why you’ll fall for them (or not)
Australian emergency warning system hacked, thousands receive alerts
Breaches, market volatility and the government shutdown: Security in the
crosshairs
Data Privacy Day 2019
Ethereum cryptocurrency suspended after attackers steal nearly $1.1M
Harness the NIST CSF to boost your security and compliance
Hijacked Nest camera blares warning about North Korean missiles
How cyber competitions can help fill the cybersecurity talent shortage
How Facebook's privacy woes might change the rules of the road in 2019
How to protect backups from ransomware
How to reduce security staff turnover? Focus on culture and people
Redefining the Cloud and Cloud Security
Take time to think about security amidst the greatest gadget show on the
planet
The 2018 Forrester Total Economic Impact™ of Salsify
The cybersecurity skills shortage is getting worse
The most interesting and important hacks of 2018
The State of Software Security is Still a Challenge
The three most important ways to defend against security threats
Vulnerabilities in building access system used by schools, governments
What is malware? Viruses, worms, trojans, and beyond
What is spear phishing? Why targeted email attacks are so difficult to stop
Why AI-based threat detection hasn’t taken over the market … yet
Why you need a digital forensics team (and the skills to look for)
Wireless carriers still selling Americans’ real-time location data
Multi-vector attacks target cloud-hosted technologies
CISO Hiring Guides: Find and Engage Cybersecurity Talent
51GB of financial data leaked from server not protected by password
Ursnif Trojan is back with fileless persistence
What is a supply chain attack? Why you should be wary of third-party
providers
Analyzing 2018 Attacks to Prepare for
Those in 2019 | SecurityWeek.Com
A new report from Check Point discusses major cyber
incidents from 2018. From these data points, Check Point's
analysts look for current trends in malware and attacks, in
order to prepare for 2019's future attacks.
Bulgaria Extradites Russian Hacker to US: Embassy
Flaw in Reservation System Impacts Many Airlines
Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday
Pessimism Pervades World Economic Forum Annual Survey
Portuguese Hacker Linked to 'Football Leaks' Held in Hungary
Security in an IoT World: Your Big Data Problem is Getting Bigger
Skill Squatting: The Next Consumer IoT Nightmare?
GDPR Compliance Brings Other Benefits: Cisco Study
Enhance Your Security Posture Through Security Services
Understand More About Phishing Techniques to Reduce Your Digital Risk
The Devil You Know - How Idioms Can Relate to Information Security
The Geopolitical Influence on Business Risk Management
WEF: Cyber Attacks a Major Global Risk for
Next Decade - Infosecurity Magazine
The vast majority of senior decision makers across the globe
expect data theft and cyber-disruption to increase in 2019,
according to the latest report from the World Economic Forum
(WEF)
2018 Proved Highest Funding Year for Cybersecurity
BSIA Publishes Guidelines to Reduce Exposure to Digital Sabotage
Bug Bounties Aren’t Silver Bullet for Better Security: Report
City of Del Rio Hit by Ransomware Attack
CyberFirst Girls 2019 Kicks Off Next Week
Don't Fall for the WhatsApp Gold Scam
Global Firms Face $5tr in Cybercrime Losses
Hackers Use PayPal to Phish with Ransomware
Lessons from League of Legends Part 2: Focusing on the Goal
Malware Evades Detection One Step at a Time
New Magecart Group Hits Hundreds of Sites Via Supply Chain
New Year, New Features for Fallout EK
Orgs Slow to Advance IoT Security
Researchers Find 87GB Trove of Breached Log-Ins
Singapore Airlines Warns of Phishing Scam
The Retail Industry’s Third-Party Data Breach Problem
Three Flaws in Schneider Electric Charging Stations
UK Banks Finally Issue New Cards After Ticketmaster Breach
Using Offender Profiling Techniques in Security Operations
Would Cybersecurity Professionals Make the Best DPOs
More Money, More Worries About Cyber Risk
Consumers Terrified After Hackers Worm into Nests
Cybercrime More Common than Offline Theft
Experts Discover Modular “Anatova” Ransomware
Emotet Trojan Targets Education, Gov & Healthcare
2018: The Year of Next-Generation Attacks
US Confirms Huawei CFO Extradition Plans
Google’s €50m GDPR Fine Heralds a New Era
Active Cyber Defence Should Be Rolled Out UK-Wide: Report
Hacker Demos Jailbreak of iOS on iPhone X
Only 13% cybercrime detection in two
years - ET CISO
Every day about three to four cases of cybercrime are being
registered in the city on an average, but detection rates
remain pathetic.
6 apps that can hack your Facebook, WhatsApp, Instagram data
Beware, fake insurance company agents may be calling you
ces 2019: Privacy becomes a selling point at CES 2019
Cyber-security trends to look out for in 2019
cybersecurity: Demand for cybersecurity first responders rises as salaries shoot up
Focus on data safety to push realty demand
German data breach prompts calls for improved online security
Over 700 million email IDs hacked, here’s how you can check if yours is in the list
Venture capital funding of cybersecurity firms hit record high in 2018
cyber security: Enterprises must be prepared for mega cyber attacks: Check Point
CEO
Skybox Security: Cybersecurity threats and vulnerabilty trends in APAC for 2019