El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 10

Noviembre (November), Volumen 16/2019 New Study: Hospital Breaches Could Be Killing Patients New Website Mocks Excuses Given by Breached Companies To Prove Cybersecurity's Worth, Create a Cyber ... To Secure Multicloud Environments, First ... Twitter & Trend Micro Fall Victim to Malicious Insiders US Lawmakers Fear Chinese-Owned TikTok Poses ... What Do You Do When You Can't Patch Your IoT Endpoints? 5G Myth Busting: Unpacking the Cybersecurity Risks and Realities Accenture Launches Cyber Ranges for Industrial Companies Canada Credit Union Data Breach Bigger Than First Thought: Desjardins Chinese Cyberspies Use New Malware to Intercept SMS Traffic at Mobile Operators Art Imitates Life: Lessons from the Final Season of Mr. Robot BlueKeep Attacks Have Arrived, Are Initially Underwhelming Calypso APT Emerges from the Shadows to Target Governments China-Linked Hackers Spy on Texts With MessageTap Malware Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks What Has Cybersecurity Pros So Stressed - - And Why ... Clean Up Your Act with Better Cyber Hygiene Data Breach Fines: Are They Working to Boost Consumer Safety? Who Made the List Of 2019's Nastiest Malware? Why Cloud-Native Applications Need Cloud-Native ... Why It's Imperative to Bridge the IT & OT Cultural ... 5G Myth Busting: Unpacking the Cybersecurity Risks and Realities Accenture Launches Cyber Ranges for Industrial Companies Canada Credit Union Data Breach Bigger Than First Thought: Desjardins Cyberbalkanization and the Future of the Internet Cybersecurity Executives Say Cost of Security Reasonable: Survey Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand Data Breach at St. Louis Health Center Impacts up to 152,000 DHS Warns of Critical Flaws in Medtronic Medical Devices Don't Let Annual Predictions Overshadow the Need for Iterative Security Facebook Agrees to Pay Fine in Cambridge Analytica Scandal 4 million more cybersec pros needed to meet skills shortage Chinese Cyberspies Use New Malware to Intercept SMS Traffic at Mobile Operators Hackers Can Target LEADTOOLS Users With Malicious Image Files APT 41 using MessageTap malware to gather SMS traffic Are businesses asking the right questions when it comes to cloud security? Clean Up Your Act with Better Cyber Hygiene Cyberbalkanization and the Future of the Internet Cybersecurity Executives Say Cost of Security Reasonable: Survey Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging Payloads Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware Snowden Warns of Web Giants' 'Irresistible Power' CISOs cite lack of resources as the biggest hurdle Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand Tech Firms React to Netizens' Digital Privacy Concerns Emotet Resurgence Continues With New Tactics, Techniques and Procedures Ex-Twitter Employees Spied on Saudi Dissidents: DoJ Eye Clinic Breach Reveals Data of 20,000 Patients Fancy Bear Targets Sporting, Anti-Doping Orgs As 2020 Olympics Loom How to Secure Critical Infrastructure When Patching Isn't Possible ICS Attackers Set To Inflict More Damage With Evolving Tactics Magecart Groups Attack Simultaneous Sites in Card-Theft Frenzy News Wrap: Voice Assistant Laser Hack, Twitter Insider Threats, Data Breach Fine Fails Platinum APT Shines Up New Titanium Backdoor Presentation Template: Build Your 2020 Security Plan Pwn2Own Tokyo Roundup: Amazon Echo, Routers and Smart TVs Fall to Hackers Understanding the Ripple Effect: Large Enterprise Data Breaches Threaten Everyone Data breach causes 10 percent of small businesses to shutter DDoS attackers claim to be Russian APT group, demand ransom First BlueKeep hacking campaign discovered after months of caution Hospitals decide to pay ransom after attack. Did they have options? Data Breach at St. Louis Health Center Impacts up to 152,000 DHS Warns of Critical Flaws in Medtronic Medical Devices Don't Let Annual Predictions Overshadow the Need for Iterative Security Facebook Agrees to Pay Fine in Cambridge Analytica Scandal How to effectively manage cyber-threats on critical infrastructure Hackers Can Target LEADTOOLS Users With Malicious Image Files How to manage cyber-security on a global scale How you might be installing malware on your own Wordpress sites Interview: Veracode CEO Sam King: "STEM isn't everything" Misconfiguration: most common IT mistake by SMBs Nikkei falls foul of £22 m BEC scam in a single transaction Post-Brexit, EU, UK must join forces on cyber-security, top negotiator says Microsoft: BlueKeep Exploit Will Likely Deliver More Damaging Payloads Sepio Systems Raises $6.5 Million to Defend Against Rogue Hardware Snowden Warns of Web Giants' 'Irresistible Power' Tech Firms React to Netizens' Digital Privacy Concerns The Future of Cyber Through the Eyes of an Intelligence Firm Transitioning to a Security-Driven Networking Strategy Trend Micro Employee Sold Customer Data to Scammers Sisters doing it for themselves - a practical approach to cyber-tech for women What Security Trends Are You Thankful For? Tell government what's needed: Cyber APT28 Hacking Group Attacking Sporting The Future of Cyber Through the Eyes of an Intelligence Firm Transitioning to a Security-Driven Networking Strategy Trend Micro Employee Sold Customer Data to Scammers What Security Trends Are You Thankful For? Cyber security: Employee behaviour among biggest challenges to cyber security in India: Sophos cyberattack: Isro warned of a possible cyberattack earlier this year Cybercriminals using enterprise based strategies for phishing data breach: Vedantu's data breach risked 680,000 customers data Encrypted threat and IoT malware attack rise in 2019: Report Marine firm James Fisher reports cyber breach More and more IT professionals looking for a new job Privacy class-action lawsuits to grow 300% in 2020: Forrester quantum supremacy: 'Quantum supremacy' and the threat it poses to data storage, digital economy Whatsapp Privacy: After Pegasus spying Nikkei Hit in $29m BEC Scam North Korean Malware Found at Indian Nuke Plant Ransomware Attack on Canadian Territory Security by Sector: FireEye and Claroty Team Up to Simplify ICS/OT Threat Detection and Response Should You Trust Your Cloud Storage Provider? Study Reveals the Worst State for Online Privacy The Insider's Motive: Defending Against the 7 Most Common Insider Threats Thousands of Websites Offline as Georgia Suffers Major Cyber-Attack Top Ten: Things Learned From the 2019 (ISC)2 Workforce Study Two Plead Guilty to Uber and Lynda.com Hacks UniCredit Breach Affects Three Million Records CISOs are in a no-win situation It's a question of inclusion, period Can You Trust Security Vendor Surveys? Can You Trust Security Vendor Surveys? As IoT expands, security demands increase Back to basics: Cyber security mishaps people tend to forget about Be sure to secure this often forgotten office device Deepfakes: fact or fiction? The ID challenge continues How good are hackers at their game? This good. Organizations threatened by apps that leak data Reclaim revenue with real-time insights The age of the chief digital officer The surprising truth: How Millennials vs. Gen Z prefer to communicate Your current cloud configuration could compromise your organization 50 Shades of Gray in Cybersecurity Digital Transformation and the CISO Field CISO Q&A: Jim Richberg How to Avoid an IoT Doomsday 10