El Diario del CISO El Diario del CISO (The CISO Journal) Edición 21 | Page 9

Thehacke rsnews
Can cyber insurance cover acts of cyber terrorism ?
Rough trade : Why financial markets will need to stay on top of their game
How blockchain might make chatbots a more secure user interface
The best way to connect with a distracted and time-crunched security buyer
How kidney stones help us think better about implementing security
Unsecured server exposes 157 GB of highly sensitive data
Apache Tomcat Patches Important Security Vulnerabilities
iPhone Hacking Campaign Using MDM Software Is Broader Than Previously
Known
Titan Security Keys – Google launches its own USB-based FIDO U2F Keys
NetSpectre — New Remote Spectre Attack Steals Data Over the Network
Egyptian ' Fake News ' Law Threatens Citizens with 5000-plus Followers
New Bluetooth Hack Affects Millions of Devices from Major Vendors
Google Bans Cryptocurrency Mining Android Apps From the Play Store
Computerweekly
Information-managment
Application attacks demand new security approach
Code names and flowers : Rabobank ' s novel approach to protecting customer data
Beyond GDPR : ePrivacy could have an even greater impact on mobile
FDA issues guidance on how to use EHR data in clinical studies
Cyber security – why you ’ re doing it all wrong
In the wake of GDPR , college IT security programs need to evolve
Cyber security vulnerability concerns skyrocket
Phishing attack results in a breach and patient protection services at Texas anesthesia practice
Dark web cyber crime markets thriving
The first step in strong information security is to understand data assets
ERP applications are under cyber attack , research confirms
The top security and risk management trends facing organizations
Ramp up security to mitigate Office 365 attacks
Understanding risks to data drives controls efficiencies
Ransomware concern drops despite being top cost
Securityboulevar
ITSecurityguru
“ YOU ARE HACKED ” Ransom Virus – Remove It and Restore Data
Could complacency be setting in when it comes to ransomware ?
5 Cryptojacking Consequences CISOs Can ' t Ignore
Effort backed by Leading Bodies in the Field Aims to Support National Cyber
Security Strategy .
The 5 Common Mistakes Your Devops Team is Making
Five common myths of SMBs when it comes to cyber security and online encryption
Three C-Words of Web App Security : Part 1 – CORS
IoT security – A barrier to deployment ?
Was The Crystal Ball Crystal Clear ? Reflecting on 2018 Cybersecurity
Predictions
Protecting Data in the Era of IoT
Why Penetration Testing and Assessments Should Include Real-World
Supply Chain Attacks on the Rise as One of the Biggest New Threat Vectors as
Scenarios
Organisations Scramble to Close Gaps
Techrepublic
ETCISO
50 +% of DevOps pros handle security , but they lack proper knowledge and
Cybercriminals recall old vulnerabilities , using cameras & printers for DDoS
skills
attacks : Report