El Diario del CISO El Diario del CISO (The CISO Journal) Edición 17 | Page 9
Noviembre (November), Volumen 17/2019
digital privacy, stealing data’
Architectural design, not security or
privacy major risk in going digital: Archie
Jackson, Head IT & IS, Incedo
Cybercriminals primarily targeting e-
commerce apparel sites: Kaspersky
Cyber risk management should be part of
business strategy, feel experts
CFO Tech: 'Cybersecurity is CFOs' biggest
priority'
dmitriy ayrapetov: Cybersecurity should
be the core pillar of any modern digital
hospital: Dmitriy Ayrapetov
7 Takeaways: Insider Breach at Twitter
Hackers Steal $49 Million in Ethereum
From Upbit Exchange
Compromised Website Led to Australia
Parliament Hack
Dell Considering Selling RSA: Report
DOJ: Pair Used SIM Swapping Scam to
Steal Cryptocurrency
Louisiana Government Recovering From
Ransomware Attack
Server RCE Vulnerability
Stalkerware - New Android Spyware Apps
Gain Admin-level Access
T-Mobile Hacked - Hackers Gained Access
to Prepaid Customers Data
This Week In Security: More WhatsApp,
Nextcry, Hover To Crash, And Android
Permissions Bypass
Companies Need to Rethink What
Cybersecurity Leadership Is
Cyber security – a profession – really?
What Is Zero Trust, and Why Does It
Work?
Mystery surrounds leak of four billion user
records
Conservatives propose national cyber
crime force
The Security Interviews: Do cyber
weapons need a Geneva Convention?
Security skills gap will take a decade to fill
Top APAC security predictions for 2020
Target for Financial Crimes
RevengeHotels: cybercrime targeting hotel ThreatList: Healthcare Breaches Spike in
front desks worldwide
October
Spam and phishing in Q3 2019 WhatsApp: Government plans WhatsApp
security systems audit
The cybercrime ecosystem: attacking
blogs Measuring Organization’s Cybersecurity
Data of 1.2 Billion People Exposed Online A new Sino-Russian high-tech partnership
‘High-valued’ Social Media Accounts
Targeted by SIM-Swappers for
Cryptocurrency
5 Simple Ways to Protect Your
Smartphone from Cyber Attacks
Artificial Intelligence in Cybersecurity… Is
The Glass Half-Empty or Half-Full?
Chicago student charged with writing code
to spread ISIS propaganda
The Security Challenges of Robotic Process
Automation—A Primer
Windows 7 end-of-life is coming. How
much should you worry?
Professional rule-breakers don’t just get
away with it: They also get raises
Be sure to secure this often forgotten
office device
New JavaScript Skimmer Found on E-
Commerce Sites Should security shift from defence to
containing attacks?
Managing the inevitable: what happens
when security is breached? PayMyTab Exposes Restaurant Customer
Data: Report Tension-by-design is a healthy way to run
cybersecurity, say panellists Phishing Campaigns Spoof Government
Agencies: Report
Ransomware Analysis: 'Shade' Surges;
Other Trends Emerge Security campaigns do not work, says
infosec professor Adam Joinson
Magento Marketplace suffers data breach
exposing confidential details of users
Cybersecurity Workforce Shortage
Continues to Grow
Voluntary Disclosure of Cybersecurity
Risks Mitigates Contagion Effect With
Investors Forget crowbars, hackers can break in
with laser beams
Exceptional strategies for a thriving,
innovative culture and enterprise
Digital lives in danger: How cyber attacks
are evolving
Malware Analysis Tools Diversify To
Address Scale Of New Cyber-Attacks How artificial intelligence enhances cyber
security
Macy's E-Commerce Site Hacked
Ransomware Attackers Leak Stolen Data
Restaurant Chain: Malware Infected PoS
Devices
Target Sues Insurer Over 2013 Data
Breach Costs
DDoS: An Underestimated Threat
Most Organizations Have Incomplete
Vulnerability ...
The 5-Step Methodology for Spotting
Malicious Bot ...
What is payroll hacking and how to fight it The Russian Railways information system
got hacked in 20 minutes - E Hacking News
- Latest Hacker News and IT Security News
Diversified strategies for gaining digital
trust
New Banking Trojan Infects Victims via
McDonald’s Malvertising 6 Top Nontechnical Degrees for
Cybersecurity
New DeathRansom Ransomware Begins to What is Shodan? The search engine for
9 Principles to Simplify Security
How Safe Are Home Security Systems?
12 Tips for Dealing with a Manipulative
Security ...
An Alarming Number of Software Teams
Are Missing ...
Data breached in translation
The 'Department of No': Why CISOs Need
to Cultivate ...
They See You When You're Shopping:
Holiday ...
3 Fundamentals for Better Security and IT
Management
The age of the chief digital officer Workforce Well-Being in the World of
Cyber
Unsecured Server Exposed Records of 1.2 Enterprise Cyber Security Trends and
Billion: Researchers
Predictions 2020
Cyber Security Digital Summit: A 101
Cybersecurity for Dummies eBook
Guide to Security Automation
Catch Restaurants Disclose Credit Card
Detecting Enterprise Security Threats And
Stealing Malware Incident
Unusual Behavior With SIEM
Dutch Govt Warns of 3 Ransomware
Email Security: The Seismic Shift To Highly-
Infecting 1,800 Businesses
Targeted Attacks
Livingston School District in New Jersey Hit People Are The Greatest Asset To Thwart
With Ransomware
Modern Email Security Threats
Louisiana Government Suffers Outage Due Corporate resistance – the unspoken IT
to Ransomware Attack
security risk
A new era of cyber warfare: Russia’s
Macy's Customer Payment Info Stolen in
Sandworm shows “we are all Ukraine” on
Magecart Data Breach
the internet
Millions of Sites Exposed by Flaw in
11 top cloud security threats
Jetpack WordPress Plugin
T-Mobile Says Prepaid Accounts Breached
Facebook Breach Victims Can Sue For
'Reasonable' Security
Employee Privacy in a Mobile Workplace
The Implications of Last Week's Exposure
of 1.2B ...
Anatomy of a BEC Scam
Leaks of NSA, CIA Tools Have Leveled
Nation-State ...
On the Border Warns of Data Breach
A CEO, CIO And CISO Walk Into A Bar...
Multiple 2K Social Media Accounts Hacked
And Posting Offensive Material
Council Post: Rethinking Information
Security
Council Post: What To Know About Cyber
Insurance
IBM Security BrandVoice: Embracing
Open, Integrated Security In A Multicloud
World
10 Predictions How AI Will Improve
Cybersecurity In 2020
Sandworm Russia, America and the new
era of cyber war
FCC Takes Steps Toward Squeezing Out
Huawei, ZTE
The Internet: Looking Back and Forward
50 Years
Louisiana IT Official: Ransomware Attack
‘Not Catastrophic’
Ransomware Again Strikes Louisiana,
Forcing Server Shutdowns
Smashing Security podcast: Juice jacking,
YouTube hacking, password slacking
Target Seeks $74M in Data Breach
Reimbursement from ... VIDEO: "Not All Cybercriminals Are Evil
Geniuses"
T-Mobile Prepaid Hit by Significant Data
Breach Whitepaper: Cybersecurity is improving,
but is it enough?
Disruptive technology predictions: 2020
will see the creation of completely
connected environments
To improve incident response, you need
To Prove Cybersecurity's Worth, Create a
9