El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 6

Other Important News Apache Struts 2.3.x vulnerable to two year old RCE flaw Attackers breached Statcounter to steal cryptocurrency from gate.io users Beagle free visual analytics tool helps bring cybercriminals to justice CFO: Disrupting, taking control, and turning data into value Closing the security gap will drive $125 billion critical infrastructure security spending Companies implementing DevSecOps address vulnerabilities faster than others Consumers can't shake risky security habits Consumers would stop engaging with a brand online following a breach Countering threats: Steps to take when developing APIs Data revolution backlash: Consumers prepared to take decisive action if organizations mishandle data Ensuring election integrity: The overlooked last mile of securing voter data DevOps and security: How to make disjointed security and DevOps teams work effectively DJI plugs security flaws that could have enabled access to users' data and drone images HSBC: Security Breach Exposes Account, Transaction Data Five key considerations when developing a Security Operations Center High risk vulnerability discovered in Sauter CASE Suite building automation software How email fraud tactics continue to find new life How financial institutions can change the economics of fraud How task management and easy collaboration can help your security team Hybrid cloud complexity pushes organizations to look for more security tools Implications of the NIS Directive for the industrial sector Post implementation, GDPR costs higher than expected Reported breaches in the first 9 months of 2018 exposed 3.6 billion records Self-encrypting SSDs vulnerable to encryption bypass attacks VirtualBox Guest-to-Host escape 0day and exploit released online Vulnerabilities' CVSS scores soon to be assigned by AI Working from anywhere, keeping your files in sync and staying secure IT-to-OT Solutions That Can Bolster Security in the ... 20 Cybersecurity Firms to Watch Microsoft President: Governments Must Cooperate on ... 5 Reasons Why Threat Intelligence Doesn't Work Most Businesses to Add More Cloud Security Tools 5 Things the Most Secure Software Companies Do (and ... New Side-Channel Attacks Target Graphics Processing ... 7 Non-Computer Hacks That Should Never Happen Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security After the Breach: Tracing the 'Smoking Gun' Symantec Uncovers North Korean Group's ATM Attack ... Banking Malware Takes Aim at Brazilians The Morris Worm Turns 30 Crytpocurrency Exchange Targeted Via Attack on Web ... User Behavior Analytics Could Find a Home in the OT ... Energy Sector's IT Networks in the Bulls-Eye Utah Hacker Pleads Guilty to DoS Attacks: DoJ Guilty Plea Made in Massive International Cell ... Vulnerabilities in Our Infrastructure: 5 Ways to ... Hidden Costs of IoT Vulnerabilities What You Should Know About Grayware (and What to Do ...