El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 9
News3
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Other News
12 dark secrets of cloud security
5 essential controls to include in your cyber security checklist
5 strategies for improving employee experience
75% of Security awareness professionals work part-time
according to SANS Report
83% of UAE IT Decision-Makers Agree on data sovereignty’s
importance
A City Paid a Hefty Ransom to Hackers. But Its Pains Are Far From
Over.
A Critical Google Chrome Security Bug Can Now Bring You No
Less than $30,000
A new Equation Editor exploit goes commercial, as maldoc
attacks using it spike
A.I. has a bias problem — that can be a big challenge in
cybersecurity
Aavgo security lapse exposed hotel bookings
Attorney General Barr Argues for Access to Encrypted Content
Australia's NAB says 13,000 customers' personal data breached
Boost Application Security With DevSecOps
Boost Infrastructure Immunity Against the Ransomware Epidemic
(SecurityWeek)
British Airways faces record £183m fine for data breach
British Airways, multada con más de 200 millones por el robo de
datos de sus clientes
Building the Higher Ed InfoSec Community at the 2019 Security
Professionals Conference and Beyond
Can cybersecurity offer value for money?
Close the Gender Gap by Championing Women in Cybersecurity
Jobs – Here's How
Comparing 5G to Wi-Fi 6 from a security perspective
Cost of a Data Breach Study
Critical Flaw in Drupal Allow Hackers to Take Control of Websites
Cyber Incidents and Breaches: The Data Dilemma
Cyber Lessons from the Pentagon, Oracle, CrowdStrike, and Ex-
CIA Entrepreneur
Cyber Security as a Service Market - Growing Consumption to
Proliferate Growth at 12.5% CAGR Till 2025, Reports TMR
Cyber Security Market Size & Share Spending Predicted To Exceed
USD 181.77 Billion by 2021
Cybersecurity: Where Are You Going Wrong?
Cybersecurity: Why your board won’t listen
Database Security Framework & Best Practices
Defending the Enterprise From the Coming Wave of Ransomware
Attacks
Dishing On Phishing: Look Both Ways Before You Cross The Street
Employee Turnover And Computer Forensic Analysis Best
Practices
Equifax to pay £561 million to settle data breach
Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence
Far too many government entities simply lack the resources and
expertise needed to keep pace with the velocity of cybersecurity
threats.
Financial Data Privacy? Consumers 'Could Care Less'
FTC commissioners: Facebook’s $5bn fine was too light
Governor Cuomo Signs Legislation Protecting New Yorkers
Against Data Security Breaches
Hackers can manipulate any file you receive from them
Hackers Made an App That Kills to Prove a Point
Hackers pinch 7.5B of data from Russian FSB contractor
How to Avoid Cyber Threats by Disgruntled Employees
How to Compete with 'Free?' Create Your Own Channel Value
How to develop an effective cybersecurity plan
How To Implement A Successful Cybersecurity Plan
In systemic breach, hackers steal millions of Bulgarians' financial
data
Iranian cyber activity "spiked" after U.S. withdrawal from nuclear
deal, says Microsoft official
It's never good when 'Magecart' and 'bulletproof' appear in the
same sentence, but here we are
Kaspersky finds 60% rise in users hit by password stealers in 2019
Marcus Hutchins, who stopped WannaCry's spread, avoids prison
time
Media File Jacking allows Hackers to Manipulate Media Files
Received Via Whatsapp and Telegram
Microsoft’s Azure Phishing Attacks
NASA Hacked : Why It Happened & What Can You Learn?
New Cyber Attack Trends Report Reveals That Digital Criminals
Made Off With $45 Billion in 2018
New old Windows bug emerges, your 'strong' password is anything
but, plus plenty more
NSA aims to up its cybersecurity game
Palo Alto gateway security alert, FSB hack, scourge of data-stealing
web plugins, and more
Protecting your business from phishing scams
Ransomware Amounts Rise 3x in Q2 as Ryuk & Sodinokibi Spread
Ransomware attacks: How to get the upper hand
Researchers to launch intentionally ‘vulnerable’ blockchain at Black
Hat
Richard Clarke on U.S. cyberdefenses: "We're paying lip service"
School of Cyberthreats: 3 Attacks Impacting Today’s Schools
Security executives more stressed – but more optimistic – about
email threats
Security Headers Updates
Silicon Valley Has Let Its Cybersecurity Guard Down, Experts Say
Six Key Security Trends and Predictions on 2019 from Ixia's
Application and Threat Intelligence (ATI) Research Center
SQL injection cheat sheet
The 10 Biggest Cybersecurity Stocks
The Art of CISO - Master of Warfare
The digital enterprises’ cybersecurity
The Sorry State of Cybersecurity Imagery
The Unsexy Threat to Election Security
Unreal Steganography: Using A VR Application As A Steganography
Carrier
US company selling weaponized BlueKeep exploit (ZDNet)
WannaCry Hero Marcus Hutchins Won't Go to Jail for Old Hacking
Crimes
Watching the WatchBog: New BlueKeep Scanner and Linux Exploits
What happens when a country’s entire adult population is hacked?
Whatsapp Images, Videos Hacked To Gain Control of Phone: How To
Avoid
Where Cybersecurity and Business Align: One CISO’s High-Level
Perspective
Why more businesses need a CISO mindset -TEISS® : Cracking Cyber
Security
Why quantum computing could make today's cybersecurity obsolete
You’re very easy to track down, even when your data has been
anonymized