El Diario del CISO El Diario del CISO (The CISO Journal) Edición 25 | Page 6
Other Important News
37% of IT Managers See Failure to Install Updates as the Biggest Security
Instagram’s New Security Tools are a Welcome Step, But Not Enoughd
Threat of 2018d
5 Simple Questions On Serverless Security, That Every CISO Should Be Ready IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network
To Answerd
Attacksd
Making an Impact with Security Awareness Training: Structuring the
7 Security Awareness Tips for Developers in Your Organizationd
Programd
7 Steps to Building a Successful Career in Information Securityd
Managed Detection and Response: Hype or Hope?d
77% of Businesses Have Experienced Cyber Attack in the Past 12 Monthsd
Navigating and Evaluating Cloud Security Solutionsd
A Security Checklist for Financial Institutionsd
Organizations Are Unrealistic, Overconfident about Their Cybersecurity Skillsd
A Zero Trust Manifestod
Police Investigating Data Breach at Chinese Hotel Groupd
Instagram’s New Security Tools are a Welcome Step, But Not Enoughd
Preventive Security for Youd
Air Canada Mobile App Data Breach: Passport Details Affectedd
Protecting Sensitive Data: What a Breach Means to Your Businessd
Report: Nearly Half of Security Professionals Think They Could Execute a
Bank of Spain Hit by a DDoS Attack, No Evidence of Data Breachd
Successful Insider Attack on Their Organizationd
Best Responses to '4 Effective Targeted Techniques to Marketing GDPR'd
Securing Industrial IoT Sensors, Part 2: Trusted Software Stackd
Botnet Activity in 2018 Shows Increased Distribution of RATsd
Securing Multi-Cloud Environmentsd
Building the security operations center of tomorrow—harnessing the law of
Security Awareness Checklist Items for Technology Companiesd
data gravityd
Container Security Part 2 – Benchmarks to the Rescued
Security: The Rules of Engagement to Mitigate Insider Riskd
Critical Components of Implementing a Successful Security Champions
Securosis, 'Black Hat and AI, What Could Go Wrong?'d
Programd
CVE-2018-14619: New Critical Linux Kernel Vulnerabilityd
Selecting a Security Leader: Don’t Get Caught in No Man’s Landd
Struts flaw, SAST, IAST, DAST & RASP primer, hacking planes, ATMs, and
CVE-2018-6622: TPM Chips Can Be Hijacked by Hackersd
water heatersd
DD Budiharto on the Journey from Janitor to CISOd
The Cyber Kill Chain: What You Need to Knowd
Defining and Managing Success for Security Teamsd
The Evolution of IoT Attacksd
Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going
The Joy of Tech®'s 'Sextortion'd
Strongd
Evolution of Cyber Security in Healthcared
The Most Vulnerable and Hackable Medical Devicesd
The Shared Security Podcast Episode 79 – Election Hacking and Vulnerable
Facebook Server RCE Vulnerability Disclosedd
Voting Machinesd
FBI IoT Alert—But Have They Got It Right?d
The Sky Is Falling! No Wait, That’s Just Our Data in the Cloud!d