El Diario del CISO El Diario del CISO (The CISO Journal) Edición 30 | Page 10
Securitybrief
GDPR compliance: Looking beyond the hype
Facebook breach: Ready for the coming phishing wave?
More OT devices added to Tenable's industrial security offering
New online tool helps organisations evaluate security maturity
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Research finds majority of businesses failing to comply with GDPR
ETCISO
3.2 Bn data records compromised worldwide in the first half of 2018: Report
apple: Secret, no more: Apple's new privacy portal shows what user data it
keeps
EU states push for sanctions for cyber attackers
Hacked, scammed and on your own: navigating cryptocurrency 'wild west'
Prompt action of police helps cyber fraud victims get refund from banks
Welivesecurity
Facebook downgrades victim count, nature of data stolen more sensitive
GreyEnergy revealed as successor to BlackEnergy
GreyEnergy revealed as successor to infamous BlackEnergy APT group
Preparation, planning and practice can make all the difference
Scams and flaws: Why we get duped and how we can avoid them
VestaCP compromised in a new supply-chain attack
ITSecurityguru
83 percent of UK consumers unsure of fintech, according to wide-ranging
survey
BSIMM9 Study Highlights Impact of Cloud Transformation and Growth of
Software Security Community
Cyber security tales of terror that are sure to make your skin crawl
Janrain Survey Shows Consumers Still Trust Brands but Want More Control
over Data
One Identity Global Survey Shows Organisations Continue to Struggle to Get
Basic Identity and Access Management Best Practices Right, Potentially
Exposing Them to Security Risks
Surge in Facebook hacking: Six cases in two days
Securityreading
Critical Flaw in Libssh Allow Attackers to Bypass Authentication and Gain
Administrative Access
Critical Flaw in Tumblr may have Exposed User Data
Critical Flaws was Discovered in Diesel Engine Controllers by Auto Maskin
GreyEnergy Threat Group Targets Critical Infrastructure in Poland and
Ukraine
Over 35 Million US Voters Records Discovered for Sale
Computerweekly
IoT firms sign up to UK security code of practice
C-suite needs to drive outcomes-based security
Forbes
Cybersecurity And The Human Element: Creating Realistic Solutions For A
Safer Digital World
Cybersecurity Needs Women: Here's Why
Cybersecurity Procedures: Six Approaches For Improving Employee Buy-in
How Big Of A Role Will AI Have In Cybersecurity Over The Next Decade?
What Are The Biggest Cyber-Security Trends Of 2018?
RSAconference
15 Years of National Cyber Security Awareness Month
Options Abound for Cyber Security Jobseekers, but Finding the Right Fit
Takes Work