El Diario del CISO El Diario del CISO (The CISO Journal) Edición 30 | Page 8
Knowing how to define, screen and monitor your third parties is essential to
minimizing risk
Legacy government networks stifle cloud migration
'Operation Oceansalt' Reuses Code from Chinese Group APT1
3 Public Cloud Security Myths Debunked
A History of Defense-in-Depth; and the Evolution of Data Sharing
After 2016 Hack, Illinois Says Election System Secure
Apple's Revamped Privacy Website Offers Users Access to Their Data
Branch.io Flaws Exposed Tinder, Shopify, Yelp Users to XSS Attacks
Chef Launches New Version for DevSecOps Automated Compliance
Chinese Hackers Use 'Datper' Trojan in Recent Campaign
City Pays $2,000 in Computer Ransomware Attack
Collection Strategies: The Key Differentiator Among Threat Intelligence
Vendors
Critical Vulnerabilities Allow Takeover of D-Link Routers
35 Million Voter Records From 20 States For Sale On The Dark Web
Who gets spear phished, and why?
Why we need to bridge the gap between IT operations and IT security
EU Leaders Vow Tough Action on Cyber Attacks
FreeRTOS Vulnerabilities Expose Many Systems to Attacks
Hackers Breach HealthCare.gov System, Get Data on 75,000
Insurer Anthem Will Pay Record $16M for Massive Data Breach
Malicious RTF Documents Deliver Information Stealers
Many Federal Agencies Fail to Meet DMARC Implementation Deadline
Oracle's October 2018 Update Includes 301 Security Fixes
Server With National Guard Personnel Data Target of Attack
Tech Giants Concerned About Australia's Encryption Laws
Utimaco's Acquisition of Atalla HSM Product Line Gets Regulatory Clearance
Web Isolation Firm Garrison Technologies Raises $30 Million
MoD Secrets Exposed In Data Breaches
NCSC Report Says Phishing On The Decline As Nation State Attacks Take Over,
A Layer Of Protection From The Outside World
Major UK Cyber Attack Inevitable
Acumin Consulting Reagarding Worldwide Shortage Of Almost 3 Million Staff Number Of People Searching Cyber Security Recruitment Increases 93%
Cyber Wargames A Tactic Few Organisations Use To Promote Cyber
Online Dating Fall Victim To £2,000 And Children At Risk Of Blackmail Due To
Awareness - Deloitte Survey
Online Streaming
Every Move You Make
Pentagon Data Breach Of 30,000 Personnel's Credit Card Data
Ponemon 2018 Endpoint Security Risk Rept: 64% Of Enterprises
GreyEnergy Malware Targeting Critical Infrastructure
Compromised, Attack Costs Up 42%, 4x More Likely To Be Hit With Zero
Day/Fileless Attack Vs Prior Year
Ransomware Attack On Water Utility & Ways To Thwart/Minimize Attack
How To Avoid An Insider Threat Nightmare
Damage
How to Boost Remote Productivity While Remaining Secure
The Haunting Horror Story Of Cybercrime
In Praise Of The Hackers
UK Faces 10 Cyberattacks A Week
UK Government Launches Voluntary Code Of Practice To Help Secure
IoT Code Of Conduct
Connected Devices
Millions Of Users Breached At FitMetrix
XSS Vulnerabilities Found In Tinder