El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 8

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader CSHUB 6 Cyber Security Trends To Watch Going Into 2020 AI Could Escalate New Type Of Voice Phishing Cyber Attacks Cyber Security Stats For Mid-Year 2019 Infographic Enterprise Cyber Security And The Role Of The C-Suite Incident Of The Week: FaceApp Now Viral For Security Risks Incident Of The Week: Malware Infects 25M Android Phones IoT Device Deployments Are Outpacing IoT Security Measures The Future Of Cyber Risk And Bringing ROI To Security Zdnet Australia Post a 'trusted' service provider for government identification Australian privacy law amendments to cover data collection and use by digital platforms Bluetooth exploit can track and identify iOS, Microsoft mobile device users Cybersecurity: Is your boss leaving your organisation vulnerable to hackers? Cyberwarfare in space: Satellites at risk of hacker attacks OpenNIC drops support for .bit domain names after rampant malware abuse Ransomware: Why cities have become such a big target for cyberattacks - and why it'll get worse Sweden and UK's surveillance programs on trial at the European Court of Human Rights Nakedsecurity BlueKeep guides make imminent public exploit more likely Facebook gets its wrist slapped $5b for fumbling our data, confirms FTC Hacked Bulgarian database reaches online forums Monday review – the hot 22 stories of the week RDP exposed: the wolves already at your door S2 Ep1: FaceApp, logic bombs and stranger danger Podcast You can probably be identified from your anonymized data Dataprivacyandsecurityinsider Business Email Compromises Bilking U.S. Companies Out of $301M Per Month FIN8 Back in Business Stealing Credit Card Information with Badhatch GandCrab Ransomware Backers Working on New Ransomware REvil Health Care Organizations Have Highest Costs for Data Breaches UPS Seeks Certification for Drone Delivery Services Techrepublic 3 enterprise cybersecurity trends CISOs must pay attention to 83% have experienced a DDoS attack in the past two years, survey finds Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery How to reverse the cybersecurity staffing shortage: 5 tips Top 5 cybersecurity challenges for CISOs Securitynow Bluetooth Devices Leaking Tracking Data Data Protection in the Cloud Is Still a Big Issue in the EU DNS Hijacking on the Rise as Warning Is Issued Malvertising Adds Sophistication to Disruption New BitPaymer Ransomware Discovered Hunting Big Game Welivesecurity Data breaches can haunt firms for years South African power company battles ransomware attack Streaming service withstands 13-day DDoS siege VLC player has a critical flaw – and there’s no patch yet (updated) Itp 75% of Security awareness professionals work part-time according to SANS Report 83% of UAE IT Decision-Makers Agree on data sovereignty’s importance Kaspersky finds 60% rise in users hit by password stealers in 2019 Govtech America Is Not Ready for War in Cyberspace, Experts Warn Cybersecurity Leaders Prepare for a New Decade of Threats Google Pitches to Baltimore after Ransomware Attacks Henry County, Ga., Investigates Possible Cyberattack Locking Down Data: The Rise of the Chief Privacy Officer Louisiana Declares State Emergency After Malware Attack NASCIO Endorses Federal Cybersecurity Collaboration Bill Oregon Sharpens Cyberdefenses in the Months After DHS Breach Techtarget BlueKeep blues: More than 800,000 systems still unpatched Building the best incident response framework for your enterprise CERT vs. CSIRT vs. SOC: What's the difference? Cybersecurity skills shortage prompts new hiring approach Equifax to pay up to $700 million in data breach settlement New ransomware threat takes GandCrab's place Portrait of a CISO: Roles and responsibilities Ransomware attacks: How to get the upper hand Forbes Council Post: Seven Common Cybersecurity Mistakes Made With AI ExtraHop BrandVoice: Why Invest In Cloud-Based Machine Learning For Cybersecurity? FaceApp: Is The Russian Face-Aging App A Danger To Your Privacy? Good Governance: Do Boards Need Cyber Security Experts? Warning As Iranian State Hackers Target LinkedIn Users With Dangerous New Malware Why AI Is The Future Of Cybersecurity Securityintelligence How Prepared Is the Financial Services Sector to Respond to a Systemic, Global Cyberattack? Is It Time to Start Certifying Connected Devices? NIST Says Preparation Is Key to the Risk Management Framework This Is What Experts Say Will Turn the Tide Against Increasing Cyberthreats What's New in the 2019 Cost of a Data Breach Report Helpnetsecurity Cyberthreats targeting municipalities are on the rise Inside the NIST team working to make cybersecurity more user-friendly ISA Global Cybersecurity Alliance to advance awareness, readiness, and knowledge sharing Multi-stage attack techniques are making network defense difficult The importance of hardening firmware security Securityboulevard Executives’ Changing Views on Cybersecurity How to Get Your Cyber-Hygiene House in Order Top 10 Facts from AV Test’s Annual Cybersecurity Report Which Country is #1 in Cybersecurity? Inforisktoday Johannesburg Utility Recovering After Ransomware Attack Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay Security Flaw Exposed Valid Airline Boarding Passes Comptia 4 Ways to Market Yourself and Land Your Dream Job Close the Gender Gap by Championing Women in Cybersecurity Jobs – Here's How How to Compete with 'Free?' Create Your Own Channel Value The Changing Cybersecurity Landscape: Security Analyst Skills Needed Why Cybersecurity Is a Great Field for Women www.cisos.club [email protected]