El Diario del CISO El Diario del CISO (The CISO Journal) Edición 27 | Page 10
The FDA’s New Digital Health Cyber Unit: What Would It Do?
Uber Reaches $148 Million Breach Settlement With States
Many employee work habits seem innocent but invite security threats
The answers to questions in the following areas likely will dictate how well a
healthcare organization can protect patient data.
White House National Cyber Strategy: An Analysis
Securitynow
50M Facebook Accounts Exposed Due to Software Vulnerability
VPNFilter Is 'Swiss Army Knife' of Malware
Adwind RAT Squeaks Past Linux, Windows, macOS Defenses
Zero Trust & Network Segmentation: Keys to Securing IoT
iOS 12: How Apple Keeps Getting Mobile Security Wrong
United Nations' Websites Besieged by Data Leaks, Exposed Files
Cybertalk
Cyberattack targets Port of San Diego
Facebook flaws lead to data breach; 50M users affected
Study uncovers risky internal cybersecurity practices
Uber slapped with $148M settlement for data breach
Who gets blamed when a cyberattack hits an enterprise?
Computerweekly
Business leaders expect suppliers to ensure they are cyber secure
Explosion in fake data-stealing shopping sites
Financial services firms face potential security bombshell
Mac OS Mojave zero-day warning
Norwegian state discusses vulnerabilities with IT sector
Welivesecurity
DDoS attacks on UK universities could be the work of students
How to improve hiring practices for cybersecurity professionals
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
The speaker can overcome nerves with useful tips on public speaking
Itspmagazine
Avoiding The Common Pitfalls Of SMB Security
How to Measure the ROI of Cybersecurity Investments
Rethinking Modern-Day DDoS Attacks And Their Risk
Databreachtoday
Gone in 15 Minutes: Australia’s Phone Number Theft Problem
Scan4You Operator Gets 14-Year Prison Sentence
Why Was Equifax So Stupid About Passwords?
Krebsonsecurity
Beware of Hurricane Florence Relief Scams
Facebook Security Bug Affects 90M Users
Secret Service Warns of Surge in ATM ‘Wiretapping’ Attacks
Bankinfosecurity
Breach Investigations: The Examiner’s View
Twitter Bug Sent Direct Messages to External Developers
Information-age
Cyber security in the energy sector: Rolling out a strategy - Part 3
Melanie Oldham gives her tips for building a cyber security team
Lawjournalnewsletter
Cybersecurity for Government: Lessons from the Front Line
Podcast: Cognitive Security
Simple News
3 Cybersecurity Challenges for IIoT Devices in 2018
www.roboticsbusinessreview.com