El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 7
News1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Cybersecurity, Data Privacy Are Top
Concerns for Enterprises
Domain Name System Attack Cost Rises 49 Percent to $1,070,000
Enterprises Challenged with Security Basics
Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at
Risk
Five Reasons SMBs Are Starting to Pay Attention to Cybersecurity
Fla. City to Pay $600K Ransom to Hacker
Fraud and Data Breaches – Are Consumers Bringing Worries To Work?
Identity Theft and Cyber-Fraud in the UK Hit All-time High
Manufacturing Companies Face Cybersecurity Threats
News Industry At Risk of Data Breaches Data Misuse
Pennsylvania Officials Attend Cybersecurity Training
Quantifying Risk & Security Funding: How Everyone Can Get What They Want
Ransomware Attacks: Strategies to Recover and Prevent Them
Smartphone Access Is More Cyber Secure than Card-Based
New Survey Uncovers Primary Challenges
in Creating A Security Culture
The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike
Backs
1.5 Billion Gmail Calendar Users are the Target of a Crafty New Phishing Scam
Bogus Emails: 3.4 Billion Are Sent Every Day...
Business Email Compromise Continues to Rise with Malicious URLs as the Favorite
Among Attackers
Chinese Hackers Infiltrate Global Telecom Networks With Spear Phishing
Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000
Is Compliance Security’s Worst Enemy?
Massive Cyberheist Bankrupts Medical Debt Collector
Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications
Two-Thirds of Organizations See an Increase in Impersonation Attacks
U.S. May Face Cyberwar with Russia After Purported U.S. Attacks on Russian Power
Grid
Why Do Organizations Still Under-report Cybercrime?
UK to launch security standard for
surveillance cameras
Cyber attackers using wider range of threats
Enterprises challenged with security basics
Inside F5’s cyber security playbook
Most mobile apps vulnerable to malware
BC/DR plan key to cyber attack survival
Business needs to see infosec pros as trusted advisers
Is it true you can't manage what you don't measure?
IT asset separation is a risk-based decision
Singapore faced fewer cyber threats in 2018
UK cyber security progress stalled, says report
DHS warns of increased Iranian
cyberattacks on enterprises
4 steps to critical infrastructure protection readiness
BlueKeep warnings having little effect on Windows patching
GandCrab decryption tool helps victims recover data
Gartner: Application security programs coming up short
Gartner: Cybersecurity skills shortage requires a new approach
How can developers avoid a Git repository security risk?
VMs vs. containers: Which is better for security?
Privacy legislation may soon affect
smaller businesses
Hackers breach NASA, steal Mars mission data
LoudMiner: Cross-platform mining in cracked VST software
Stopping stalkerware: What needs to change?
Two US cities opt to pay $1m to ransomware operators
Telcos around the world hit by long-
term intelligence gathering
cyberattack
4 tips for building a strong security culture
5 ways compliance hurts security
6 questions to ask before buying an ICS / OT security monitoring tool
6 signs the CIO-CISO relationship is broken — and how to fix it
8 steps to make sure Microsoft Windows 10 1903 is ready for deployment
A new website explains data breach risk
Cybersecurity pros' haphazard participation in data privacy a concern
DNS hijacking grabs headlines, but it’s just the tip of the iceberg
Emerging security threats at the half-year mark
Forthright handling of cybercrime essential to improved results
Mike Assante’s lasting impact on critical infrastructure security (and me)
New MongoDB field-level encryption can help prevent data breaches
Top 8 security mistakes in SAP environments
US Cyber Command Warns of
Outlook Vulnerability Exploits
5 Cyberattacks That You Would Miss Without AIWebinar.
A CISO's Insights on Breach Detection
Adoption of Security Best Practices: A Status Report
AMCA Bankruptcy Filing in Wake of Breach Reveals Impact
Can Patient Data Be Truly ‘De-Identified’ for Research?
Case Study: Moving to DevSecOps
Certain Insulin Pumps Recalled Due to Cybersecurity Issues
Health Data Breach Tally: A Mid-Year Update
Insurer: Breach Undetected for Nine Years
Leveraging Analytics for More Effective Security Performance Management
Medical Device Security: The Manufacturer’s View
Zero Trust' Adds Up to Better Security
NIST Releases IoT Cyber Security And
Privacy Risks Report
Cyber Security Mid-Year Snapshot 2019
How To Properly Define A Threat Hunting Operation
Incident Of The Week: Cloud Security Breach Of PCM Inc.
Incident Of The Week: Oregon DHS Target Of Phishing Attack
The Biggest Problem In Cyber Security Right Now
The Ethics Of The IoT: Are Engineers Failing To Speak Up?
GandCrab Ransomware Decryption
Tool
5 Keys to Improve Your Cybersecurity
'Legit Apps Turned into Spyware' Targeting Android Users in Middle East
New Mac Malware Exploits GateKeeper Bypass Bug that Apple Left Unpatched
OpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks
A New Security Approach in the Age of
Cyber Warfare
Four Important Truths to Guide Your Access Management
KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg
Time to Hire a CISO… Where to Start?