El Diario del CISO El Diario del CISO (The CISO Journal) Edición 17 | Page 10

Noviembre (November), Volumen 17/2019 Make a Name for Itself New RIPlace Bypass Evades Windows 10, AV Ransomware Protection Ransomware Locks Medical Records at Great Plains Health Ryuk Ransomware Forces Prosegur Security Firm to Shut Down Network Shade Ransomware Is the Most Actively Distributed Malware via Email 5 Things All Smart Security Leaders Need to Do Right Now Following Massive Breach, Capital One Replacing CISO: Report IoT Security: 20 Years Behind Enterprise Computing everything on the internet 7 cheap or free cyber security training resources The 5 CIS controls you should implement first 3 keys to preserving customer relationships in the wake of a data breach Why Multifactor Authentication Is Now a Hacker Target While CISOs Fret, Business Leaders Tout Security ... Microsoft Moves Toward DNS Over HTTPS - CareersInfoSecurity Global threat groups pose new political and economic dangers Attackers' Costs Increasing as Businesses Focus on ... Significant malware attack hits Waterloo Catholic District School Board Changing Facade of Cybersecurity: Top Threat Trends for MSPs to Watch Maersk CISO on NotPetya recovery, workforce harmony and what makes a security chief Get IT Done: You Have 6 Weeks Left in 2019 Another Year, Another Decade: IT Industry Outlook 2020 Research Eyes ‘Next Steps’ MSPs Are Under Attack from Cybercriminals, Here’s How They’re Protecting Themselves Uncover Your Authentic Leadership Style with Predictive Index Science Bolstering Cyber Security: New Job Roles To Defend Against The Evolving Threat Landscape Shining A Spotlight On UK Cyber Security Standards Why Sandboxing Is A More-than- worthwhile Addition To Your Network Protection DHS New "Top 25 Software Vulns" List - Experts Insight Experts Comments On Dexphot Polymorphic Malware Detection Emergent Android banking Trojan shows app overlay attacks are still effective Russia’s Sandworm hacking group heralds new era of cyber warfare Church’s Chicken Warns of Possible Data Breach Hackers hit UK political parties with back- to-back cyberattacks - Reuters Cryptocurrency Exchange UpBit Loses $52m in Attack Leave.EU chairman's Twitter account hacked, private messages leaked European Cybersecurity Agency Publishes Report on Smart Car Security 35+ initiatives to get more women in cyber-security French Hospital Crippled by Ransomware French Hotel Giant Leaks 1TB of Client Data Gaming Users Exposed After Wizards of the Coast Leak Google Sends 12,000 State Phishing Warnings in Three Months Googlers Fired for Breaking Security Policy Governments Lose Millions to DNS Attacks Each Year Hacked Disney+ Accounts on Sale for $1 10 ways to kill your security career Is your MSP an insider threat? How a bank got hacked What it takes to be an interim CISO Using AI to Level the Cyber Playing Field Three Types of Risky Communications You Should Watch Out For Shopping at the Mall? It Can Be Just as Risky as Shopping Online Cyber ... How Medical Device Vendors Hold Healthcare Security ... When You Know Too Much: Protecting Security Data ... to consider 3rd party solutions Macy's online store compromised in Magecart-style attack 1.19 billion confidential medical images available on the internet Attackers increasingly embrace small-scale DDoS attacks to evade detection Women in cybersecurity can benefit from taking inventory of their personal apps Cyber risk increases at all layers of the corporate network Cyber threats continue to evolve, but security teams remain confident Twitter finally allows users to delete their phone number without disabling 2FA CVE gap widens: 16,738 vulnerabilities disclosed during the first nine months of 2019 Build Your Trust Advantage: Leadership in the era of data and AI everywhere 7 mobile security threats that may catch you by surprise DDoS Attacks Up Sharply in Third Quarter of 2019 Fighting holiday fraud: 5 ways ecommerce retailers can boost security The Edge Soft Skills: 6 Nontechnical Traits CISOs Need to ... A Security Strategy That Centers on Humans, Not Bugs Name That Toon: Endpoint Protection Why Cyber-Risk Is a C-Suite Issue Magecart Hits Macy's: Retailer Discloses Data Breach Has the quantum crypto break already happened? The compromising position facing UK CISOs Cyber Security: As Long As There’s Value, There’ll Be Threat Most Companies Lag Behind '1-10-60' Benchmark for ... The 2020 state of cybersecurity: 2 things enterprises need to brace for 3 Cybersecurity Trends & Predictions for 2020 (from Illumio) Researchers Explore How Mental Health Is Tracked Online Automated Systems Only: Why CISOs Should Switch Off Their Dumb Machines Federal CISO: Better Info Sharing Will Lead to More Secure Supply Chain The Thorny Problem of 5G Security Dozens of Vulnerabilities Found in Open Source VNC Systems Too Many CISOs Delay Cyber Response, DHS Official Says Palo Alto Networks hit by data leak Lithuanian Extradited to U.S. Over Hacking, Fraud Charges Peerlyst What will cyber security look like in 2020? Most Companies Don't Properly Manage Third-Party Cyber Risk Buttigieg’s CISO is ‘hard paranoid’ How to offer cyber security services Increased mobile usage, 5G/WiFi handoff big security risks in 2020: report Cybersecurity challenges for 2020 Human Nature vs. AI: A False Dichotomy? 75% of developers worry about app security, but half lack dedicated security experts on their team Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it Cyber security market will provide revenue opportunity for country: expert Ethical' hackers say: It's just hacker. To be one is no longer a bad thing Twitter Users Can Now Use 2FA Without a Phone Number What Security Trends Are You Thankful For? Zero-Day Exploits Earn Hackers Over $500K at Chinese Competition Stop the Churn, Avoid Burnout How To Keep Your Cybersecurity Personnel The Education Sector and the Increasing Threat from Cybercrime Why CHROs, CIOs and CISOs should be Are you (cyber) risk hunting? working together CyberCon power & utilities CISO Summit Data breach compromises T-Mobile Ginp - A malware patchwork borrowing and Cybersecurity conference expands to prepaid accounts from Anubis three events in 2020 Enterprises face risk as cyber-criminals use Trends and predictions for cybersecurity in 305,000 cards affected by Fin7 in DiBella’s shopping spree to target employees 2020 data breach French hospital staff turn to pen and Offshore Bank Targeted by Phineas Fisher Medical records locked by ransomware at paper after ransomware attack Confirms It Was Hacked Great Plains Health Hackers check in at hotel front desks WeWork Developers Exposed Contracts Prosegur Security Firm Shut Down worldwide and Customer Data on GitHub Network due to Ryuk Ransomware Information on 1.2 billion people Report: AccorHotels Subsidiary Exposes As Hackers Get Smarter, Can Law Firms uncovered in massive data leak Hotels and Travelers in Massive Data Leak Keep Up? Interest and skills drive talent to cyber- Governor declares state of emergency Legal Tech: Crisis Control: Best Practices 10