El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 10
Noviembre (November), Volumen 16/2019
New Study: Hospital Breaches Could Be
Killing Patients
New Website Mocks Excuses Given by
Breached Companies
To Prove Cybersecurity's Worth, Create a
Cyber ...
To Secure Multicloud Environments, First
...
Twitter & Trend Micro Fall Victim to
Malicious Insiders
US Lawmakers Fear Chinese-Owned
TikTok Poses ...
What Do You Do When You Can't Patch
Your IoT Endpoints? 5G Myth Busting: Unpacking the
Cybersecurity Risks and Realities
Accenture Launches Cyber Ranges for
Industrial Companies Canada Credit Union Data Breach Bigger
Than First Thought: Desjardins
Chinese Cyberspies Use New Malware to
Intercept SMS Traffic at Mobile Operators Art Imitates Life: Lessons from the Final
Season of Mr. Robot
BlueKeep Attacks Have Arrived, Are
Initially Underwhelming
Calypso APT Emerges from the Shadows to
Target Governments
China-Linked Hackers Spy on Texts With
MessageTap Malware
Cybercriminals Impersonate Russian APT
‘Fancy Bear’ to Launch DDoS Attacks
What Has Cybersecurity Pros So Stressed -
- And Why ... Clean Up Your Act with Better Cyber
Hygiene Data Breach Fines: Are They Working to
Boost Consumer Safety?
Who Made the List Of 2019's Nastiest
Malware?
Why Cloud-Native Applications Need
Cloud-Native ...
Why It's Imperative to Bridge the IT & OT
Cultural ...
5G Myth Busting: Unpacking the
Cybersecurity Risks and Realities
Accenture Launches Cyber Ranges for
Industrial Companies Canada Credit Union Data Breach Bigger
Than First Thought: Desjardins Cyberbalkanization and the Future of the
Internet
Cybersecurity Executives Say Cost of
Security Reasonable: Survey
Cybersecurity Workforce Gap: 145%
Growth Needed to Meet Global Demand
Data Breach at St. Louis Health Center
Impacts up to 152,000
DHS Warns of Critical Flaws in Medtronic
Medical Devices
Don't Let Annual Predictions Overshadow
the Need for Iterative Security
Facebook Agrees to Pay Fine in Cambridge
Analytica Scandal 4 million more cybersec pros needed to
meet skills shortage Chinese Cyberspies Use New Malware to
Intercept SMS Traffic at Mobile Operators Hackers Can Target LEADTOOLS Users
With Malicious Image Files APT 41 using MessageTap malware to
gather SMS traffic
Are businesses asking the right questions
when it comes to cloud security? Clean Up Your Act with Better Cyber
Hygiene
Cyberbalkanization and the Future of the
Internet
Cybersecurity Executives Say Cost of
Security Reasonable: Survey Microsoft: BlueKeep Exploit Will Likely
Deliver More Damaging Payloads
Sepio Systems Raises $6.5 Million to
Defend Against Rogue Hardware
Snowden Warns of Web Giants'
'Irresistible Power' CISOs cite lack of resources as the biggest
hurdle Cybersecurity Workforce Gap: 145%
Growth Needed to Meet Global Demand Tech Firms React to Netizens' Digital
Privacy Concerns Emotet Resurgence Continues With New
Tactics, Techniques and Procedures
Ex-Twitter Employees Spied on Saudi
Dissidents: DoJ
Eye Clinic Breach Reveals Data of 20,000
Patients
Fancy Bear Targets Sporting, Anti-Doping
Orgs As 2020 Olympics Loom
How to Secure Critical Infrastructure
When Patching Isn't Possible
ICS Attackers Set To Inflict More Damage
With Evolving Tactics
Magecart Groups Attack Simultaneous
Sites in Card-Theft Frenzy
News Wrap: Voice Assistant Laser Hack,
Twitter Insider Threats, Data Breach Fine
Fails
Platinum APT Shines Up New Titanium
Backdoor
Presentation Template: Build Your 2020
Security Plan
Pwn2Own Tokyo Roundup: Amazon Echo,
Routers and Smart TVs Fall to Hackers
Understanding the Ripple Effect: Large
Enterprise Data Breaches Threaten
Everyone
Data breach causes 10 percent of small
businesses to shutter
DDoS attackers claim to be Russian APT
group, demand ransom
First BlueKeep hacking campaign
discovered after months of caution
Hospitals decide to pay ransom after
attack. Did they have options? Data Breach at St. Louis Health Center
Impacts up to 152,000
DHS Warns of Critical Flaws in Medtronic
Medical Devices
Don't Let Annual Predictions Overshadow
the Need for Iterative Security
Facebook Agrees to Pay Fine in Cambridge
Analytica Scandal How to effectively manage cyber-threats
on critical infrastructure Hackers Can Target LEADTOOLS Users
With Malicious Image Files How to manage cyber-security on a global
scale
How you might be installing malware on
your own Wordpress sites
Interview: Veracode CEO Sam King: "STEM
isn't everything" Misconfiguration: most common IT
mistake by SMBs
Nikkei falls foul of £22 m BEC scam in a
single transaction
Post-Brexit, EU, UK must join forces on
cyber-security, top negotiator says Microsoft: BlueKeep Exploit Will Likely
Deliver More Damaging Payloads
Sepio Systems Raises $6.5 Million to
Defend Against Rogue Hardware
Snowden Warns of Web Giants'
'Irresistible Power'
Tech Firms React to Netizens' Digital
Privacy Concerns
The Future of Cyber Through the Eyes of
an Intelligence Firm
Transitioning to a Security-Driven
Networking Strategy
Trend Micro Employee Sold Customer
Data to Scammers Sisters doing it for themselves - a practical
approach to cyber-tech for women What Security Trends Are You Thankful
For? Tell government what's needed: Cyber APT28 Hacking Group Attacking Sporting The Future of Cyber Through the Eyes of
an Intelligence Firm
Transitioning to a Security-Driven
Networking Strategy
Trend Micro Employee Sold Customer
Data to Scammers
What Security Trends Are You Thankful
For?
Cyber security: Employee behaviour
among biggest challenges to cyber
security in India: Sophos
cyberattack: Isro warned of a possible
cyberattack earlier this year
Cybercriminals using enterprise based
strategies for phishing
data breach: Vedantu's data breach risked
680,000 customers data
Encrypted threat and IoT malware attack
rise in 2019: Report
Marine firm James Fisher reports cyber
breach
More and more IT professionals looking
for a new job
Privacy class-action lawsuits to grow 300%
in 2020: Forrester
quantum supremacy: 'Quantum
supremacy' and the threat it poses to data
storage, digital economy
Whatsapp Privacy: After Pegasus spying
Nikkei Hit in $29m BEC Scam
North Korean Malware Found at Indian
Nuke Plant
Ransomware Attack on Canadian Territory
Security by Sector: FireEye and Claroty
Team Up to Simplify ICS/OT Threat
Detection and Response
Should You Trust Your Cloud Storage
Provider?
Study Reveals the Worst State for Online
Privacy
The Insider's Motive: Defending Against
the 7 Most Common Insider Threats
Thousands of Websites Offline as Georgia
Suffers Major Cyber-Attack
Top Ten: Things Learned From the 2019
(ISC)2 Workforce Study
Two Plead Guilty to Uber and Lynda.com
Hacks
UniCredit Breach Affects Three Million
Records
CISOs are in a no-win situation
It's a question of inclusion, period
Can You Trust Security Vendor Surveys?
Can You Trust Security Vendor Surveys?
As IoT expands, security demands increase
Back to basics: Cyber security mishaps
people tend to forget about
Be sure to secure this often forgotten
office device
Deepfakes: fact or fiction? The ID
challenge continues
How good are hackers at their game? This
good.
Organizations threatened by apps that
leak data
Reclaim revenue with real-time insights
The age of the chief digital officer
The surprising truth: How Millennials vs.
Gen Z prefer to communicate
Your current cloud configuration could
compromise your organization
50 Shades of Gray in Cybersecurity
Digital Transformation and the CISO
Field CISO Q&A: Jim Richberg
How to Avoid an IoT Doomsday
10