El Diario del CISO El Diario del CISO (The CISO Journal) Edición 29 | Page 7
US wants to prohibit data localization, top trade official says amid looming
RBI directive
Using social media for authentication: 3 pitfalls to avoid
We need to fix AIs bias problem: Microsofts Harry Shum
World cybercrime shifts to state-backed hackers: Russian group
What is IAM? Identity and access management explained
WhatsApp fixes bug that lets hackers hijack accounts with an incoming video
Global internet shutdown likely over next 48 hrs.
call
Google limits third-party app access to users' data
WhatsApp matter: Centre seeks time from SC to file detailed reply
Hackers Infect 30,000 Routers in India With Cryptocurrency Mining Malware WhatsApp says it will store payments data locally; is in compliance with RBI
How Bengaluru citizens are dealing with Internet addiction
WhatsApp's new trick to stamp out fake news in India
How did Netflix phishing attacks use legitimate TLS certificates?
Why cybersecurity is the fastest-growing insurance market for SMBs
How local companies will gain from RBI's tough stance on data localization
Why Cybersecurity Matters in the Age of the Internet of Things
How Three Waves Of Cybersecurity Innovation Led Us Here
Why I don't believe Bloomberg's Chinese spy chip report
How to secure serverless apps and how they are hacked
Why manufacturing companies need to up their cybersecurity game
I continue to believe Aadhaar disclosure does not raise digital risks
Why marketers must get serious about blockchain technology
Indian blockchain startups struggle with a harsh new reality
PoC exploit for Windows Shell RCE released
Cryptomining dethrones ransomware as top threat in 2018
New InfoSec products of the week: October 12, 2018
Privileged account practices are poor, and IT security teams know it
Every month should be Cyber Security Awareness Month
Most consumers don’t trust companies to keep personal information secure
Securing campus networks became more challenging
Apple fixes iOS 12 passcode bypass vulnerabilities
Identity spoofing is the most prevalent attack vector for the gaming industry The end of Google+: Low usage and an API bug that exposed user data
Researchers link Industroyer to NotPetya
Four critical KPIs for securing your IT environment
945 data breaches led to compromise of 4.5 billion data records in first half of
Juniper fixes 30+ vulnerabilities in its routing, switching devices
2018
Your backup data sets can become a treasure trove for advanced threat
Mobile security threats: Lack of visibility is putting businesses at risk
detection
Most Fortune 50 companies unprepared for major DNS attack
Health websites routinely share your activity with 57 third-parties
Demand for smart security is on the rise
Most hosting providers take too long to remove malware distribution sites
Current state of IoT deployments and future expansion across enterprises
MikroTik routers with default credentials can be easily compromised
Magecart hacks Shopper Approved to simultaneously hit many e-commerce
Keeping your cloud malware-free: What you need to know
sites
October 2018 Patch Tuesday: Microsoft fixes 49 flaws, one APT-wielded
DevOps and digital transformation initiatives are creating insecure apps
zero-day
9 million Xiongmai cameras, DVRs wide open to attack
Global spending on security solutions to reach $133.7 billion in 2022
Fake Adobe Flash Installers Come With a Little Malware Bonus
FB wants more time to study breach impact on Indian users
Five cyber security threats to be aware
F-Secure names Rahul Kumar new Country Manager for India & SAARC
Gemalto reports 4.6 billion record breaches in the first half of 2018