El Diario del CISO El Diario del CISO (The CISO Journal) Edición 27 | Page 10

The FDA’s New Digital Health Cyber Unit: What Would It Do? Uber Reaches $148 Million Breach Settlement With States Many employee work habits seem innocent but invite security threats The answers to questions in the following areas likely will dictate how well a healthcare organization can protect patient data. White House National Cyber Strategy: An Analysis Securitynow 50M Facebook Accounts Exposed Due to Software Vulnerability VPNFilter Is 'Swiss Army Knife' of Malware Adwind RAT Squeaks Past Linux, Windows, macOS Defenses Zero Trust & Network Segmentation: Keys to Securing IoT iOS 12: How Apple Keeps Getting Mobile Security Wrong United Nations' Websites Besieged by Data Leaks, Exposed Files Cybertalk Cyberattack targets Port of San Diego Facebook flaws lead to data breach; 50M users affected Study uncovers risky internal cybersecurity practices Uber slapped with $148M settlement for data breach Who gets blamed when a cyberattack hits an enterprise? Computerweekly Business leaders expect suppliers to ensure they are cyber secure Explosion in fake data-stealing shopping sites Financial services firms face potential security bombshell Mac OS Mojave zero-day warning Norwegian state discusses vulnerabilities with IT sector Welivesecurity DDoS attacks on UK universities could be the work of students How to improve hiring practices for cybersecurity professionals LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group The speaker can overcome nerves with useful tips on public speaking Itspmagazine Avoiding The Common Pitfalls Of SMB Security How to Measure the ROI of Cybersecurity Investments Rethinking Modern-Day DDoS Attacks And Their Risk Databreachtoday Gone in 15 Minutes: Australia’s Phone Number Theft Problem Scan4You Operator Gets 14-Year Prison Sentence Why Was Equifax So Stupid About Passwords? Krebsonsecurity Beware of Hurricane Florence Relief Scams Facebook Security Bug Affects 90M Users Secret Service Warns of Surge in ATM ‘Wiretapping’ Attacks Bankinfosecurity Breach Investigations: The Examiner’s View Twitter Bug Sent Direct Messages to External Developers Information-age Cyber security in the energy sector: Rolling out a strategy - Part 3 Melanie Oldham gives her tips for building a cyber security team Lawjournalnewsletter Cybersecurity for Government: Lessons from the Front Line Podcast: Cognitive Security Simple News 3 Cybersecurity Challenges for IIoT Devices in 2018 www.roboticsbusinessreview.com