El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 9
Noviembre (November), Volumen 16/2019
Fuentes de Información / Sources
Noticias
#BSidesBelfast: We Need Security
Capabilities For Our Whole Lifetime
#ISC2Congress: CISOs Are Forgetting to Be
Human
#ISC2Congress: Cybersecurity Education
Requires a Transdisciplinary Approach
#ISC2Congress: Cybersecurity Recruitment
Is in a Dangerous Crisis Noticias
#ISC2Congress: Hero Pilot Schools
Cybersecurity Professionals 9 Ways Data Vampires Are Bleeding Your
Sensitive ...
#ISC2Congress: The Truth Behind the Lack
of Women in Cybersecurity Accounting Scams Continue to Bilk
Businesses
£265m Data Breach Costs Could Have
Been Avoided with £9600 Worth of Bug
Bounties
Attack on Indian Ed Tech Firm Exposes
687K Users
10 'Secure' Ways to Start a Conversation
4 Security Lessons Federal IT Pros Can
Teach the ...
4 Ways to Soothe a Stressed-Out Incident
Response Team
5 Things the Hoodie & the Hard Hat Need
to Know ...
Facebook Sues Spyware Maker Over
WhatsApp Exploit
Building a Cybersecurity Culture: What's
Love Got ... Facebook: Developers Wrongfully
Accessed User Data
Fast-Food Chain Krystal Investigates Card
'Security Incident'
Capital One Shifts Its CISO to New Role
BBC News Goes Dark with Tor Site Cybersecurity's 'Moral Imperative'
Building a Security Testing Plan Database Error Exposes 7.5 Million Adobe
Customer ...
Details of Attack on Electric Utility Emerge
Disclosure Does Little to Dissuade Cyber
Spies
Curbing Insider Insecurity Enterprise Web Security: Risky Business
Cybersecurity Risk is Growing, and We Are
Not Ready
Cybersecurity Skills Shortage Tops Four
Million
Drivers' Data Exposed in 7-Eleven Fuel App
Breach
Drone Wars: Experts Warn of Flying
Network Security Threat
Facebook Admits Another Developer
Privacy Snafu
Facebook Finally Pays £500K Cambridge
Analytica Fine
Facebook Takes Spyware Firm NSO Group
to Court
Fakes, Privacy Awareness and Disaster
Relief Predicted for 2020
Fashion Site Sixth June Leaking Card Data
to Magecart Hackers
German Automation Giant Still Down
After Ransomware Attack
Global Registrar Web.com Suffers Major
Breach
Is the Next Generation Ready to Deal With
Malware?
Major Cyber-Attack on APAC Ports Could
Cost $110bn Facebook Says Israeli Firm Was Involved in
Recent ...
Find New Talent, Don't Fight Over CISSPs:
Insights ...
Midwest to Get First Cyber Battalion The Cold Truth about Cyber Insurance
Millions of Adobe Customers Exposed in
Privacy Snafu
Most Effective Phishing Tactic Is to Make
People Think They've Been Hacked
Noticias
50% of apps will not be migrated to the
cloud
A continuous problem: Tackling the
cybersecurity skills shortage
Companies should disclose cybersecurity
risk management efforts
Container usage has grown in complexity,
specific security controls are needed
Cybercriminals are testing exposed
Chinese APT Group Targets Mobile
credentials for future account takeover
Networks: FireEye Mandiant
attacks
Cybercriminals using custom phishing
Combating Cybercrime: Key Challenges for
tools to target the world’s largest tech
2020s and Beyond
brands
As Phishing Kits Evolve, Their Lifespans
Shorten AWS Customers Hit by Eight-Hour DDoS
Cash-back Websites Expose 2 TB of
Sensitive Information
Chartered Institute: IT Security Industry is
Stagnating
Noticias
12-Year Prison Term for Hacking LA Court
System
Alleged Capital One Hacker Released From
Prison
Beam Me Up, Alexa: Digital Assistants
Hacked By Lasers
Business Email Compromise: Battling
Advanced Attackers
First Bluekeep Exploit Found in the Wild
Free & Discounted Security Services Now
Available ...
Hacking Phones: How Law Enforcement Is
Saving Privacy
Hospital Cyberattacks Linked to Increase
in Heart ...
How HR and IT Can Partner to Improve
Cybersecurity
New Office 365 Phishing Scam Leaves A
Voicemail
Quantifying Security Results to Justify
Costs
Raising Security Awareness: Why Tools
Can't Replace ...
Ransomware Attack Hits Las Cruces, New
Mexico ...
Security Pros Fear Insider Attacks Stem
from Cloud Apps
Siemens PLC Feature Can Be Exploited for
Evil - and ...
The Edge
The Real Reasons Why the C-Suite Isn't
Complying ...
Defining risk controls that actually work
Download PPT template: Build your 2020
security plan
Employees know vulnerabilities exist, but
they can’t resolve them quickly enough
Europol: Spear phishing the most
Following Massive Breach, Capital One
prevalent cyber threat affecting orgs
Replacing CISO: Report
across the EU
Here's Why 'Raccoon' Infostealer Is
Examining security process maturity in 400
Popular With Criminals
organizations
Italy’s UniCredit: Breach Went Undetected How can security teams effectively
for Four Years
monitor OT and ICS networks?
Johannesburg Struggles to Recover From
How has your organization's risk level
Ransomware Attack
changed in the past 12 months?
Joker's Stash Lists 1.3 Million Stolen Indian IaaS cloud vulnerabilities expected to
Payment Cards
increase 50% over 2018 figures
Integrating security into IoT projects is not
Latest BEC Victims: Nikkei, City of Ocala
easy, but it's increasingly urgent
Massive Cyberattack Slams Country of
IoT is an ecosystem, as secure as its
Georgia
weakest link
McAfee: Malicious Voicemails Target
Is the enterprise on the brink of a global
Office365 Users
web supply chain attack?
NordVPN Says Server Compromised Due
Keeping up with the evolving ransomware
to Misconfiguration
security landscape
Phishing Campaign Uses Salary Increase
Leading domain name registrars suffered
Ploy: Report
data breach
Pwn2Own Contest to Focus on Industrial
Majority of 2019 breaches were the result
Control Systems
of unapplied security patches
Ransomware Gangs' Not-So-Secret Attack Most organizations plan to increase their
Vector: RDP Exploits
cybersecurity budgets in 2020
Ransomware: Average Ransom Payout
People are the very first element in a
Increases to $41,000
pragmatic cybersecurity strategy
Skimming Malware Found on American
Phishing attacks at highest level in three
Cancer Society Webstore
years
'Soviet Tactics': Russia Tries Prisoner Swap Security and risk compliance: Still the most
for Hacker
important part of IT strategy
Security services and network security still
Three Charged in $11 Million BEC Scam
top spending priorities for CISOs in MENA
Trend Micro Employee Sold Consumer
The digital economy is approaching a
Data to Scammers
critical tipping point
Two Data Leaks Expose Millions of
The nastiest ransomware, phishing and
Records
botnets of 2019
The promise and peril of post quantum
Two Uber Hackers Plead Guilty
computing
Why Is Third-Party Risk Management So
Want to overcome patching challenges
Complex?
once and for all? Automation is the key
Zappos' Offer to Breach Victims: A 10
Alexa, Siri, Google Smart Speakers Hacked
Percent Discount
Via Laser Beam
9