El Diario del CISO El Diario del CISO (The CISO Journal) Edición 29 | Page 7

US wants to prohibit data localization, top trade official says amid looming RBI directive Using social media for authentication: 3 pitfalls to avoid We need to fix AIs bias problem: Microsofts Harry Shum World cybercrime shifts to state-backed hackers: Russian group What is IAM? Identity and access management explained WhatsApp fixes bug that lets hackers hijack accounts with an incoming video Global internet shutdown likely over next 48 hrs. call Google limits third-party app access to users' data WhatsApp matter: Centre seeks time from SC to file detailed reply Hackers Infect 30,000 Routers in India With Cryptocurrency Mining Malware WhatsApp says it will store payments data locally; is in compliance with RBI How Bengaluru citizens are dealing with Internet addiction WhatsApp's new trick to stamp out fake news in India How did Netflix phishing attacks use legitimate TLS certificates? Why cybersecurity is the fastest-growing insurance market for SMBs How local companies will gain from RBI's tough stance on data localization Why Cybersecurity Matters in the Age of the Internet of Things How Three Waves Of Cybersecurity Innovation Led Us Here Why I don't believe Bloomberg's Chinese spy chip report How to secure serverless apps and how they are hacked Why manufacturing companies need to up their cybersecurity game I continue to believe Aadhaar disclosure does not raise digital risks Why marketers must get serious about blockchain technology Indian blockchain startups struggle with a harsh new reality PoC exploit for Windows Shell RCE released Cryptomining dethrones ransomware as top threat in 2018 New InfoSec products of the week: October 12, 2018 Privileged account practices are poor, and IT security teams know it Every month should be Cyber Security Awareness Month Most consumers don’t trust companies to keep personal information secure Securing campus networks became more challenging Apple fixes iOS 12 passcode bypass vulnerabilities Identity spoofing is the most prevalent attack vector for the gaming industry The end of Google+: Low usage and an API bug that exposed user data Researchers link Industroyer to NotPetya Four critical KPIs for securing your IT environment 945 data breaches led to compromise of 4.5 billion data records in first half of Juniper fixes 30+ vulnerabilities in its routing, switching devices 2018 Your backup data sets can become a treasure trove for advanced threat Mobile security threats: Lack of visibility is putting businesses at risk detection Most Fortune 50 companies unprepared for major DNS attack Health websites routinely share your activity with 57 third-parties Demand for smart security is on the rise Most hosting providers take too long to remove malware distribution sites Current state of IoT deployments and future expansion across enterprises MikroTik routers with default credentials can be easily compromised Magecart hacks Shopper Approved to simultaneously hit many e-commerce Keeping your cloud malware-free: What you need to know sites October 2018 Patch Tuesday: Microsoft fixes 49 flaws, one APT-wielded DevOps and digital transformation initiatives are creating insecure apps zero-day 9 million Xiongmai cameras, DVRs wide open to attack Global spending on security solutions to reach $133.7 billion in 2022 Fake Adobe Flash Installers Come With a Little Malware Bonus FB wants more time to study breach impact on Indian users Five cyber security threats to be aware F-Secure names Rahul Kumar new Country Manager for India & SAARC Gemalto reports 4.6 billion record breaches in the first half of 2018