El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 6
Other Important News
Apache Struts 2.3.x vulnerable to two year old RCE flaw
Attackers breached Statcounter to steal cryptocurrency from gate.io users
Beagle free visual analytics tool helps bring cybercriminals to justice
CFO: Disrupting, taking control, and turning data into value
Closing the security gap will drive $125 billion critical infrastructure security
spending
Companies implementing DevSecOps address vulnerabilities faster than
others
Consumers can't shake risky security habits
Consumers would stop engaging with a brand online following a breach
Countering threats: Steps to take when developing APIs
Data revolution backlash: Consumers prepared to take decisive action if
organizations mishandle data
Ensuring election integrity: The overlooked last mile of securing voter data
DevOps and security: How to make disjointed security and DevOps teams
work effectively
DJI plugs security flaws that could have enabled access to users' data and
drone images
HSBC: Security Breach Exposes Account, Transaction Data
Five key considerations when developing a Security Operations Center
High risk vulnerability discovered in Sauter CASE Suite building automation
software
How email fraud tactics continue to find new life
How financial institutions can change the economics of fraud
How task management and easy collaboration can help your security team
Hybrid cloud complexity pushes organizations to look for more security tools
Implications of the NIS Directive for the industrial sector
Post implementation, GDPR costs higher than expected
Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
Self-encrypting SSDs vulnerable to encryption bypass attacks
VirtualBox Guest-to-Host escape 0day and exploit released online
Vulnerabilities' CVSS scores soon to be assigned by AI
Working from anywhere, keeping your files in sync and staying secure
IT-to-OT Solutions That Can Bolster Security in the ...
20 Cybersecurity Firms to Watch Microsoft President: Governments Must Cooperate on ...
5 Reasons Why Threat Intelligence Doesn't Work Most Businesses to Add More Cloud Security Tools
5 Things the Most Secure Software Companies Do (and ... New Side-Channel Attacks Target Graphics Processing ...
7 Non-Computer Hacks That Should Never Happen Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security
After the Breach: Tracing the 'Smoking Gun' Symantec Uncovers North Korean Group's ATM Attack ...
Banking Malware Takes Aim at Brazilians The Morris Worm Turns 30
Crytpocurrency Exchange Targeted Via Attack on Web ... User Behavior Analytics Could Find a Home in the OT ...
Energy Sector's IT Networks in the Bulls-Eye Utah Hacker Pleads Guilty to DoS Attacks: DoJ
Guilty Plea Made in Massive International Cell ... Vulnerabilities in Our Infrastructure: 5 Ways to ...
Hidden Costs of IoT Vulnerabilities What You Should Know About Grayware (and What to Do ...