El Diario del CISO El Diario del CISO (The CISO Journal) Edición 25 | Page 6

Other Important News 37% of IT Managers See Failure to Install Updates as the Biggest Security Instagram’s New Security Tools are a Welcome Step, But Not Enoughd Threat of 2018d 5 Simple Questions On Serverless Security, That Every CISO Should Be Ready IoT, 5G Networks and Cybersecurity: A New Atmosphere for Mobile Network To Answerd Attacksd Making an Impact with Security Awareness Training: Structuring the 7 Security Awareness Tips for Developers in Your Organizationd Programd 7 Steps to Building a Successful Career in Information Securityd Managed Detection and Response: Hype or Hope?d 77% of Businesses Have Experienced Cyber Attack in the Past 12 Monthsd Navigating and Evaluating Cloud Security Solutionsd A Security Checklist for Financial Institutionsd Organizations Are Unrealistic, Overconfident about Their Cybersecurity Skillsd A Zero Trust Manifestod Police Investigating Data Breach at Chinese Hotel Groupd Instagram’s New Security Tools are a Welcome Step, But Not Enoughd Preventive Security for Youd Air Canada Mobile App Data Breach: Passport Details Affectedd Protecting Sensitive Data: What a Breach Means to Your Businessd Report: Nearly Half of Security Professionals Think They Could Execute a Bank of Spain Hit by a DDoS Attack, No Evidence of Data Breachd Successful Insider Attack on Their Organizationd Best Responses to '4 Effective Targeted Techniques to Marketing GDPR'd Securing Industrial IoT Sensors, Part 2: Trusted Software Stackd Botnet Activity in 2018 Shows Increased Distribution of RATsd Securing Multi-Cloud Environmentsd Building the security operations center of tomorrow—harnessing the law of Security Awareness Checklist Items for Technology Companiesd data gravityd Container Security Part 2 – Benchmarks to the Rescued Security: The Rules of Engagement to Mitigate Insider Riskd Critical Components of Implementing a Successful Security Champions Securosis, 'Black Hat and AI, What Could Go Wrong?'d Programd CVE-2018-14619: New Critical Linux Kernel Vulnerabilityd Selecting a Security Leader: Don’t Get Caught in No Man’s Landd Struts flaw, SAST, IAST, DAST & RASP primer, hacking planes, ATMs, and CVE-2018-6622: TPM Chips Can Be Hijacked by Hackersd water heatersd DD Budiharto on the Journey from Janitor to CISOd The Cyber Kill Chain: What You Need to Knowd Defining and Managing Success for Security Teamsd The Evolution of IoT Attacksd Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going The Joy of Tech®'s 'Sextortion'd Strongd Evolution of Cyber Security in Healthcared The Most Vulnerable and Hackable Medical Devicesd The Shared Security Podcast Episode 79 – Election Hacking and Vulnerable Facebook Server RCE Vulnerability Disclosedd Voting Machinesd FBI IoT Alert—But Have They Got It Right?d The Sky Is Falling! No Wait, That’s Just Our Data in the Cloud!d