El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 6

Other Important News 'Fancy Bear' Targets Democratic Sen. Claire McCaskill 'Identity Has Become the Perimeter': Oracle ... 'Password Check Required'? Not So Fast 24 Sentenced in India-Based Call Center Operation 5 Ways Small Security Teams Can Defend Like Fortune ... 7 Ways to Better Secure Electronic Health Records US-CERT Warns of ERP Application Hacking 8 Steps Toward Safer Elections Automating Kernel Exploitation for Better Flaw ... CoinVault Authors Sentenced to Community Service DHS Officials: Hundreds of US Utility Victims ... Every Week Is Shark Week in Cyberspace How 'Projection' Slows Down the Path to Security ... Imperva Plans to Purchase Prevoty 72% of CEOs admit they've taken intellectual property from a former employer Adopting a Zero Trust approach is the best strategy to control access Attackers playing into users' commitment to security continue to sail through defenses Kronos Banking Trojan Resurfaces LifeLock Learns Lesson from Leaky Links London Calling with New Strategies to Stop Ransomware New Report Shows Pen Testers Usually Win OpenWhisk at Risk: Critical Bug Leaves IBM Cloud ... Securing Our Interconnected Infrastructure Software is Achilles Heel of Hardware ... Stealth Mango Proves Malware Success Doesn't ... The ABCs of Hacking a Voting Machine The Double-Edged Sword of Artificial Intelligence ... The Good & Bad News About Today's Cybersecurity ... Threat Hunting: Rethinking 'Needle in a Haystack' ... Two-Thirds of Organizations Hit in Supply-Chain ... Same web-based vulnerabilities still prevalent after nine years Samsung SmartThings Hub vulnerabilities allow attackers inside your home SCADA vulnerabilities in ICS architectures Vulnerability research and responsible disclosure: Advice from an industry veteran Securing the supply chain: Organizations need best practices in proactive Business leaders concerned about security, data backup is a key opportunity security Security concerns around the rapidly growing use of the Industrial Internet of ERP applications under attack: How criminals target the crown jewels Things Hackers stole personal, medication data of a quarter of Singaporeans Smart cities spending to reach $158 billion in 2022 Major websites still fail to steer users towards better passwords SME Security to bring Cybersecurity Resilience Accelerator to Australian SMEs Most organizations investing in AI, very few succeeding Swann security cameras vulnerable to spying hack Not many organizations scale their digital initiatives beyond the piloting The evolution of email fraud: Risks and protection tips stage Privacy pros gaining control of technology decision-making over IT The primary email security challenge enterprises face is trust Bluetooth vulnerability allows snooping of traffic between paired devices