El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 6
Other Important News
'Fancy Bear' Targets Democratic Sen. Claire McCaskill
'Identity Has Become the Perimeter': Oracle ...
'Password Check Required'? Not So Fast
24 Sentenced in India-Based Call Center Operation
5 Ways Small Security Teams Can Defend Like Fortune ...
7 Ways to Better Secure Electronic Health Records
US-CERT Warns of ERP Application Hacking
8 Steps Toward Safer Elections
Automating Kernel Exploitation for Better Flaw ...
CoinVault Authors Sentenced to Community Service
DHS Officials: Hundreds of US Utility Victims ...
Every Week Is Shark Week in Cyberspace
How 'Projection' Slows Down the Path to Security ...
Imperva Plans to Purchase Prevoty
72% of CEOs admit they've taken intellectual property from a former
employer
Adopting a Zero Trust approach is the best strategy to control access
Attackers playing into users' commitment to security continue to sail
through defenses
Kronos Banking Trojan Resurfaces
LifeLock Learns Lesson from Leaky Links
London Calling with New Strategies to Stop Ransomware
New Report Shows Pen Testers Usually Win
OpenWhisk at Risk: Critical Bug Leaves IBM Cloud ...
Securing Our Interconnected Infrastructure
Software is Achilles Heel of Hardware ...
Stealth Mango Proves Malware Success Doesn't ...
The ABCs of Hacking a Voting Machine
The Double-Edged Sword of Artificial Intelligence ...
The Good & Bad News About Today's Cybersecurity ...
Threat Hunting: Rethinking 'Needle in a Haystack' ...
Two-Thirds of Organizations Hit in Supply-Chain ...
Same web-based vulnerabilities still prevalent after nine years
Samsung SmartThings Hub vulnerabilities allow attackers inside your home
SCADA vulnerabilities in ICS architectures
Vulnerability research and responsible disclosure: Advice from an industry
veteran
Securing the supply chain: Organizations need best practices in proactive
Business leaders concerned about security, data backup is a key opportunity
security
Security concerns around the rapidly growing use of the Industrial Internet of
ERP applications under attack: How criminals target the crown jewels
Things
Hackers stole personal, medication data of a quarter of Singaporeans
Smart cities spending to reach $158 billion in 2022
Major websites still fail to steer users towards better passwords
SME Security to bring Cybersecurity Resilience Accelerator to Australian SMEs
Most organizations investing in AI, very few succeeding
Swann security cameras vulnerable to spying hack
Not many organizations scale their digital initiatives beyond the piloting
The evolution of email fraud: Risks and protection tips
stage
Privacy pros gaining control of technology decision-making over IT
The primary email security challenge enterprises face is trust
Bluetooth vulnerability allows snooping of traffic between paired devices