El Diario del CISO El Diario del CISO (The CISO Journal) Edición 12 | Page 7

News1 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Cybersecurity, Data Privacy Are Top Concerns for Enterprises Domain Name System Attack Cost Rises 49 Percent to $1,070,000 Enterprises Challenged with Security Basics Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk Five Reasons SMBs Are Starting to Pay Attention to Cybersecurity Fla. City to Pay $600K Ransom to Hacker Fraud and Data Breaches – Are Consumers Bringing Worries To Work? Identity Theft and Cyber-Fraud in the UK Hit All-time High Manufacturing Companies Face Cybersecurity Threats News Industry At Risk of Data Breaches Data Misuse Pennsylvania Officials Attend Cybersecurity Training Quantifying Risk & Security Funding: How Everyone Can Get What They Want Ransomware Attacks: Strategies to Recover and Prevent Them Smartphone Access Is More Cyber Secure than Card-Based New Survey Uncovers Primary Challenges in Creating A Security Culture The U.S. Launched A Cyber Attack On Iran, And We're Expecting Spear Phishing Strike Backs 1.5 Billion Gmail Calendar Users are the Target of a Crafty New Phishing Scam Bogus Emails: 3.4 Billion Are Sent Every Day... Business Email Compromise Continues to Rise with Malicious URLs as the Favorite Among Attackers Chinese Hackers Infiltrate Global Telecom Networks With Spear Phishing Hit by Ransomware Attack, Florida City Agrees to Pay Hackers $600,000 Is Compliance Security’s Worst Enemy? Massive Cyberheist Bankrupts Medical Debt Collector Phishing Attacks Go Mobile as Cybercriminals Leverage Push Notifications Two-Thirds of Organizations See an Increase in Impersonation Attacks U.S. May Face Cyberwar with Russia After Purported U.S. Attacks on Russian Power Grid Why Do Organizations Still Under-report Cybercrime? UK to launch security standard for surveillance cameras Cyber attackers using wider range of threats Enterprises challenged with security basics Inside F5’s cyber security playbook Most mobile apps vulnerable to malware BC/DR plan key to cyber attack survival Business needs to see infosec pros as trusted advisers Is it true you can't manage what you don't measure? IT asset separation is a risk-based decision Singapore faced fewer cyber threats in 2018 UK cyber security progress stalled, says report DHS warns of increased Iranian cyberattacks on enterprises 4 steps to critical infrastructure protection readiness BlueKeep warnings having little effect on Windows patching GandCrab decryption tool helps victims recover data Gartner: Application security programs coming up short Gartner: Cybersecurity skills shortage requires a new approach How can developers avoid a Git repository security risk? VMs vs. containers: Which is better for security? Privacy legislation may soon affect smaller businesses Hackers breach NASA, steal Mars mission data LoudMiner: Cross-platform mining in cracked VST software Stopping stalkerware: What needs to change? Two US cities opt to pay $1m to ransomware operators Telcos around the world hit by long- term intelligence gathering cyberattack 4 tips for building a strong security culture 5 ways compliance hurts security 6 questions to ask before buying an ICS / OT security monitoring tool 6 signs the CIO-CISO relationship is broken — and how to fix it 8 steps to make sure Microsoft Windows 10 1903 is ready for deployment A new website explains data breach risk Cybersecurity pros' haphazard participation in data privacy a concern DNS hijacking grabs headlines, but it’s just the tip of the iceberg Emerging security threats at the half-year mark Forthright handling of cybercrime essential to improved results Mike Assante’s lasting impact on critical infrastructure security (and me) New MongoDB field-level encryption can help prevent data breaches Top 8 security mistakes in SAP environments US Cyber Command Warns of Outlook Vulnerability Exploits 5 Cyberattacks That You Would Miss Without AIWebinar. A CISO's Insights on Breach Detection Adoption of Security Best Practices: A Status Report AMCA Bankruptcy Filing in Wake of Breach Reveals Impact Can Patient Data Be Truly ‘De-Identified’ for Research? Case Study: Moving to DevSecOps Certain Insulin Pumps Recalled Due to Cybersecurity Issues Health Data Breach Tally: A Mid-Year Update Insurer: Breach Undetected for Nine Years Leveraging Analytics for More Effective Security Performance Management Medical Device Security: The Manufacturer’s View Zero Trust' Adds Up to Better Security NIST Releases IoT Cyber Security And Privacy Risks Report Cyber Security Mid-Year Snapshot 2019 How To Properly Define A Threat Hunting Operation Incident Of The Week: Cloud Security Breach Of PCM Inc. Incident Of The Week: Oregon DHS Target Of Phishing Attack The Biggest Problem In Cyber Security Right Now The Ethics Of The IoT: Are Engineers Failing To Speak Up? GandCrab Ransomware Decryption Tool 5 Keys to Improve Your Cybersecurity 'Legit Apps Turned into Spyware' Targeting Android Users in Middle East New Mac Malware Exploits GateKeeper Bypass Bug that Apple Left Unpatched OpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks A New Security Approach in the Age of Cyber Warfare Four Important Truths to Guide Your Access Management KRACK is Just The Tip of the Wi-Fi Router Security Vulnerability Iceberg Time to Hire a CISO… Where to Start?