El Diario del CISO El Diario del CISO (The CISO Journal) Edición 17 | Page 10
Noviembre (November), Volumen 17/2019
Make a Name for Itself
New RIPlace Bypass Evades Windows 10,
AV Ransomware Protection
Ransomware Locks Medical Records at
Great Plains Health
Ryuk Ransomware Forces Prosegur
Security Firm to Shut Down Network
Shade Ransomware Is the Most Actively
Distributed Malware via Email
5 Things All Smart Security Leaders Need
to Do Right Now
Following Massive Breach, Capital One
Replacing CISO: Report
IoT Security: 20 Years Behind Enterprise
Computing everything on the internet
7 cheap or free cyber security training
resources
The 5 CIS controls you should implement
first 3 keys to preserving customer
relationships in the wake of a data breach Why Multifactor Authentication Is Now a
Hacker Target
While CISOs Fret, Business Leaders Tout
Security ...
Microsoft Moves Toward DNS Over HTTPS
- CareersInfoSecurity Global threat groups pose new political
and economic dangers Attackers' Costs Increasing as Businesses
Focus on ...
Significant malware attack hits Waterloo
Catholic District School Board
Changing Facade of Cybersecurity: Top
Threat Trends for MSPs to Watch
Maersk CISO on NotPetya recovery,
workforce harmony and what makes a
security chief
Get IT Done: You Have 6 Weeks Left in
2019
Another Year, Another Decade: IT Industry
Outlook 2020 Research Eyes ‘Next Steps’
MSPs Are Under Attack from
Cybercriminals, Here’s How They’re
Protecting Themselves
Uncover Your Authentic Leadership Style
with Predictive Index Science
Bolstering Cyber Security: New Job Roles
To Defend Against The Evolving Threat
Landscape
Shining A Spotlight On UK Cyber Security
Standards
Why Sandboxing Is A More-than-
worthwhile Addition To Your Network
Protection
DHS New "Top 25 Software Vulns" List -
Experts Insight
Experts Comments On Dexphot
Polymorphic Malware Detection Emergent Android banking Trojan shows
app overlay attacks are still effective
Russia’s Sandworm hacking group heralds
new era of cyber warfare Church’s Chicken Warns of Possible Data
Breach Hackers hit UK political parties with back-
to-back cyberattacks - Reuters Cryptocurrency Exchange UpBit Loses
$52m in Attack Leave.EU chairman's Twitter account
hacked, private messages leaked European Cybersecurity Agency Publishes
Report on Smart Car Security 35+ initiatives to get more women in
cyber-security
French Hospital Crippled by Ransomware
French Hotel Giant Leaks 1TB of Client
Data
Gaming Users Exposed After Wizards of
the Coast Leak
Google Sends 12,000 State Phishing
Warnings in Three Months
Googlers Fired for Breaking Security Policy
Governments Lose Millions to DNS Attacks
Each Year
Hacked Disney+ Accounts on Sale for $1
10 ways to kill your security career
Is your MSP an insider threat?
How a bank got hacked
What it takes to be an interim CISO
Using AI to Level the Cyber Playing Field
Three Types of Risky Communications You
Should Watch Out For
Shopping at the Mall? It Can Be Just as
Risky as Shopping Online
Cyber ...
How Medical Device Vendors Hold
Healthcare Security ...
When You Know Too Much: Protecting
Security Data ... to consider 3rd party solutions
Macy's online store compromised in
Magecart-style attack
1.19 billion confidential medical images
available on the internet
Attackers increasingly embrace small-scale
DDoS attacks to evade detection
Women in cybersecurity can benefit from
taking inventory of their personal apps
Cyber risk increases at all layers of the
corporate network
Cyber threats continue to evolve, but
security teams remain confident
Twitter finally allows users to delete their
phone number without disabling 2FA
CVE gap widens: 16,738 vulnerabilities
disclosed during the first nine months of
2019
Build Your Trust Advantage: Leadership in
the era of data and AI everywhere
7 mobile security threats that may catch
you by surprise
DDoS Attacks Up Sharply in Third Quarter
of 2019 Fighting holiday fraud: 5 ways ecommerce
retailers can boost security
The Edge
Soft Skills: 6 Nontechnical Traits CISOs
Need to ...
A Security Strategy That Centers on
Humans, Not Bugs
Name That Toon: Endpoint Protection
Why Cyber-Risk Is a C-Suite Issue
Magecart Hits Macy's: Retailer Discloses
Data Breach Has the quantum crypto break already
happened?
The compromising position facing UK
CISOs
Cyber Security: As Long As There’s Value,
There’ll Be Threat Most Companies Lag Behind '1-10-60'
Benchmark for ... The 2020 state of cybersecurity: 2 things
enterprises need to brace for
3 Cybersecurity Trends & Predictions for
2020 (from Illumio) Researchers Explore How Mental Health Is
Tracked Online Automated Systems Only: Why CISOs
Should Switch Off Their Dumb Machines
Federal CISO: Better Info Sharing Will Lead
to More Secure Supply Chain The Thorny Problem of 5G Security Dozens of Vulnerabilities Found in Open
Source VNC Systems
Too Many CISOs Delay Cyber Response,
DHS Official Says Palo Alto Networks hit by data leak Lithuanian Extradited to U.S. Over
Hacking, Fraud Charges
Peerlyst What will cyber security look like in 2020? Most Companies Don't Properly Manage
Third-Party Cyber Risk
Buttigieg’s CISO is ‘hard paranoid’ How to offer cyber security services Increased mobile usage, 5G/WiFi handoff
big security risks in 2020: report Cybersecurity challenges for 2020
Human Nature vs. AI: A False Dichotomy?
75% of developers worry about app
security, but half lack dedicated security
experts on their team
Business Email Compromise: 5 ways this
fraud could happen and what can be done
to prevent it
Cyber security market will provide
revenue opportunity for country: expert
Ethical' hackers say: It's just hacker. To be
one is no longer a bad thing
Twitter Users Can Now Use 2FA Without a
Phone Number
What Security Trends Are You Thankful
For?
Zero-Day Exploits Earn Hackers Over
$500K at Chinese Competition
Stop the Churn, Avoid Burnout How To
Keep Your Cybersecurity Personnel
The Education Sector and the Increasing
Threat from Cybercrime
Why CHROs, CIOs and CISOs should be
Are you (cyber) risk hunting?
working together
CyberCon power & utilities CISO Summit
Data breach compromises T-Mobile
Ginp - A malware patchwork borrowing
and Cybersecurity conference expands to
prepaid accounts
from Anubis
three events in 2020
Enterprises face risk as cyber-criminals use Trends and predictions for cybersecurity in 305,000 cards affected by Fin7 in DiBella’s
shopping spree to target employees
2020
data breach
French hospital staff turn to pen and
Offshore Bank Targeted by Phineas Fisher Medical records locked by ransomware at
paper after ransomware attack
Confirms It Was Hacked
Great Plains Health
Hackers check in at hotel front desks
WeWork Developers Exposed Contracts
Prosegur Security Firm Shut Down
worldwide
and Customer Data on GitHub
Network due to Ryuk Ransomware
Information on 1.2 billion people
Report: AccorHotels Subsidiary Exposes
As Hackers Get Smarter, Can Law Firms
uncovered in massive data leak
Hotels and Travelers in Massive Data Leak Keep Up?
Interest and skills drive talent to cyber-
Governor declares state of emergency
Legal Tech: Crisis Control: Best Practices
10