El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 8
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
CSHUB
6 Cyber Security Trends To Watch Going Into 2020
AI Could Escalate New Type Of Voice Phishing Cyber Attacks
Cyber Security Stats For Mid-Year 2019 Infographic
Enterprise Cyber Security And The Role Of The C-Suite
Incident Of The Week: FaceApp Now Viral For Security Risks
Incident Of The Week: Malware Infects 25M Android Phones
IoT Device Deployments Are Outpacing IoT Security Measures
The Future Of Cyber Risk And Bringing ROI To Security
Zdnet
Australia Post a 'trusted' service provider for government identification
Australian privacy law amendments to cover data collection and use by digital
platforms
Bluetooth exploit can track and identify iOS, Microsoft mobile device users
Cybersecurity: Is your boss leaving your organisation vulnerable to hackers?
Cyberwarfare in space: Satellites at risk of hacker attacks
OpenNIC drops support for .bit domain names after rampant malware abuse
Ransomware: Why cities have become such a big target for cyberattacks - and
why it'll get worse
Sweden and UK's surveillance programs on trial at the European Court of
Human Rights
Nakedsecurity
BlueKeep guides make imminent public exploit more likely
Facebook gets its wrist slapped $5b for fumbling our data, confirms FTC
Hacked Bulgarian database reaches online forums
Monday review – the hot 22 stories of the week
RDP exposed: the wolves already at your door
S2 Ep1: FaceApp, logic bombs and stranger danger Podcast
You can probably be identified from your anonymized data
Dataprivacyandsecurityinsider
Business Email Compromises Bilking U.S. Companies Out of $301M Per Month
FIN8 Back in Business Stealing Credit Card Information with Badhatch
GandCrab Ransomware Backers Working on New Ransomware REvil
Health Care Organizations Have Highest Costs for Data Breaches
UPS Seeks Certification for Drone Delivery Services
Techrepublic
3 enterprise cybersecurity trends CISOs must pay attention to
83% have experienced a DDoS attack in the past two years, survey finds
Cybersecurity: Malware lingers in SMBs for an average of 800 days before
discovery
How to reverse the cybersecurity staffing shortage: 5 tips
Top 5 cybersecurity challenges for CISOs
Securitynow
Bluetooth Devices Leaking Tracking Data
Data Protection in the Cloud Is Still a Big Issue in the EU
DNS Hijacking on the Rise as Warning Is Issued
Malvertising Adds Sophistication to Disruption
New BitPaymer Ransomware Discovered Hunting Big Game
Welivesecurity
Data breaches can haunt firms for years
South African power company battles ransomware attack
Streaming service withstands 13-day DDoS siege
VLC player has a critical flaw – and there’s no patch yet (updated)
Itp
75% of Security awareness professionals work part-time according to SANS
Report
83% of UAE IT Decision-Makers Agree on data sovereignty’s importance
Kaspersky finds 60% rise in users hit by password stealers in 2019
Govtech
America Is Not Ready for War in Cyberspace, Experts Warn
Cybersecurity Leaders Prepare for a New Decade of Threats
Google Pitches to Baltimore after Ransomware Attacks
Henry County, Ga., Investigates Possible Cyberattack
Locking Down Data: The Rise of the Chief Privacy Officer
Louisiana Declares State Emergency After Malware Attack
NASCIO Endorses Federal Cybersecurity Collaboration Bill
Oregon Sharpens Cyberdefenses in the Months After DHS Breach
Techtarget
BlueKeep blues: More than 800,000 systems still unpatched
Building the best incident response framework for your enterprise
CERT vs. CSIRT vs. SOC: What's the difference?
Cybersecurity skills shortage prompts new hiring approach
Equifax to pay up to $700 million in data breach settlement
New ransomware threat takes GandCrab's place
Portrait of a CISO: Roles and responsibilities
Ransomware attacks: How to get the upper hand
Forbes
Council Post: Seven Common Cybersecurity Mistakes Made With AI
ExtraHop BrandVoice: Why Invest In Cloud-Based Machine Learning For
Cybersecurity?
FaceApp: Is The Russian Face-Aging App A Danger To Your Privacy?
Good Governance: Do Boards Need Cyber Security Experts?
Warning As Iranian State Hackers Target LinkedIn Users With Dangerous New
Malware
Why AI Is The Future Of Cybersecurity
Securityintelligence
How Prepared Is the Financial Services Sector to Respond to a Systemic, Global
Cyberattack?
Is It Time to Start Certifying Connected Devices?
NIST Says Preparation Is Key to the Risk Management Framework
This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats
What's New in the 2019 Cost of a Data Breach Report
Helpnetsecurity
Cyberthreats targeting municipalities are on the rise
Inside the NIST team working to make cybersecurity more user-friendly
ISA Global Cybersecurity Alliance to advance awareness, readiness, and knowledge
sharing
Multi-stage attack techniques are making network defense difficult
The importance of hardening firmware security
Securityboulevard
Executives’ Changing Views on Cybersecurity
How to Get Your Cyber-Hygiene House in Order
Top 10 Facts from AV Test’s Annual Cybersecurity Report
Which Country is #1 in Cybersecurity?
Inforisktoday
Johannesburg Utility Recovering After Ransomware Attack
Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay
Security Flaw Exposed Valid Airline Boarding Passes
Comptia
4 Ways to Market Yourself and Land Your Dream Job
Close the Gender Gap by Championing Women in Cybersecurity Jobs – Here's How
How to Compete with 'Free?' Create Your Own Channel Value
The Changing Cybersecurity Landscape: Security Analyst Skills Needed
Why Cybersecurity Is a Great Field for Women
www.cisos.club
[email protected]