El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 9

News3 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Other News 12 dark secrets of cloud security 5 essential controls to include in your cyber security checklist 5 strategies for improving employee experience 75% of Security awareness professionals work part-time according to SANS Report 83% of UAE IT Decision-Makers Agree on data sovereignty’s importance A City Paid a Hefty Ransom to Hackers. But Its Pains Are Far From Over. A Critical Google Chrome Security Bug Can Now Bring You No Less than $30,000 A new Equation Editor exploit goes commercial, as maldoc attacks using it spike A.I. has a bias problem — that can be a big challenge in cybersecurity Aavgo security lapse exposed hotel bookings Attorney General Barr Argues for Access to Encrypted Content Australia's NAB says 13,000 customers' personal data breached Boost Application Security With DevSecOps Boost Infrastructure Immunity Against the Ransomware Epidemic (SecurityWeek) British Airways faces record £183m fine for data breach British Airways, multada con más de 200 millones por el robo de datos de sus clientes Building the Higher Ed InfoSec Community at the 2019 Security Professionals Conference and Beyond Can cybersecurity offer value for money? Close the Gender Gap by Championing Women in Cybersecurity Jobs – Here's How Comparing 5G to Wi-Fi 6 from a security perspective Cost of a Data Breach Study Critical Flaw in Drupal Allow Hackers to Take Control of Websites Cyber Incidents and Breaches: The Data Dilemma Cyber Lessons from the Pentagon, Oracle, CrowdStrike, and Ex- CIA Entrepreneur Cyber Security as a Service Market - Growing Consumption to Proliferate Growth at 12.5% CAGR Till 2025, Reports TMR Cyber Security Market Size & Share Spending Predicted To Exceed USD 181.77 Billion by 2021 Cybersecurity: Where Are You Going Wrong? Cybersecurity: Why your board won’t listen Database Security Framework & Best Practices Defending the Enterprise From the Coming Wave of Ransomware Attacks Dishing On Phishing: Look Both Ways Before You Cross The Street Employee Turnover And Computer Forensic Analysis Best Practices Equifax to pay £561 million to settle data breach Ex-NSA Contractor Harold Martin Hit With 9-Year Sentence Far too many government entities simply lack the resources and expertise needed to keep pace with the velocity of cybersecurity threats. Financial Data Privacy? Consumers 'Could Care Less' FTC commissioners: Facebook’s $5bn fine was too light Governor Cuomo Signs Legislation Protecting New Yorkers Against Data Security Breaches Hackers can manipulate any file you receive from them Hackers Made an App That Kills to Prove a Point Hackers pinch 7.5B of data from Russian FSB contractor How to Avoid Cyber Threats by Disgruntled Employees How to Compete with 'Free?' Create Your Own Channel Value How to develop an effective cybersecurity plan How To Implement A Successful Cybersecurity Plan In systemic breach, hackers steal millions of Bulgarians' financial data Iranian cyber activity "spiked" after U.S. withdrawal from nuclear deal, says Microsoft official It's never good when 'Magecart' and 'bulletproof' appear in the same sentence, but here we are Kaspersky finds 60% rise in users hit by password stealers in 2019 Marcus Hutchins, who stopped WannaCry's spread, avoids prison time Media File Jacking allows Hackers to Manipulate Media Files Received Via Whatsapp and Telegram Microsoft’s Azure Phishing Attacks NASA Hacked : Why It Happened & What Can You Learn? New Cyber Attack Trends Report Reveals That Digital Criminals Made Off With $45 Billion in 2018 New old Windows bug emerges, your 'strong' password is anything but, plus plenty more NSA aims to up its cybersecurity game Palo Alto gateway security alert, FSB hack, scourge of data-stealing web plugins, and more Protecting your business from phishing scams Ransomware Amounts Rise 3x in Q2 as Ryuk & Sodinokibi Spread Ransomware attacks: How to get the upper hand Researchers to launch intentionally ‘vulnerable’ blockchain at Black Hat Richard Clarke on U.S. cyberdefenses: "We're paying lip service" School of Cyberthreats: 3 Attacks Impacting Today’s Schools Security executives more stressed – but more optimistic – about email threats Security Headers Updates Silicon Valley Has Let Its Cybersecurity Guard Down, Experts Say Six Key Security Trends and Predictions on 2019 from Ixia's Application and Threat Intelligence (ATI) Research Center SQL injection cheat sheet The 10 Biggest Cybersecurity Stocks The Art of CISO - Master of Warfare The digital enterprises’ cybersecurity The Sorry State of Cybersecurity Imagery The Unsexy Threat to Election Security Unreal Steganography: Using A VR Application As A Steganography Carrier US company selling weaponized BlueKeep exploit (ZDNet) WannaCry Hero Marcus Hutchins Won't Go to Jail for Old Hacking Crimes Watching the WatchBog: New BlueKeep Scanner and Linux Exploits What happens when a country’s entire adult population is hacked? Whatsapp Images, Videos Hacked To Gain Control of Phone: How To Avoid Where Cybersecurity and Business Align: One CISO’s High-Level Perspective Why more businesses need a CISO mindset -TEISS® : Cracking Cyber Security Why quantum computing could make today's cybersecurity obsolete You’re very easy to track down, even when your data has been anonymized