El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 8
News1.1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Ransomware Attack on Vendor Affects
600,000 A ransomware attack last fall on a company
that provides billing and other business services to
health plans and hospitals
A Vision of the Role for Machines in Security
Are Autonomous Vehicles Trustworthy?
Art Coviello on the 2019 State of Security
Citrix Hacked by Password-Spraying Attackers, FBI Warns
Consumer Privacy: Reasons for Optimism As Well As Concern
Cybercrime Disruption: The Role of Threat Research
Cybersecurity Comes to the Mid-Market
Digital Transformation Needs Security Transformation, Too
FBI’s Wray on China’s Counterintelligence Capabilities
Fresh POS Malware Strikes Small and Midsize Companies
GDPR: Still Plenty of Lessons to Learn
Hackers Love to Strike on Saturday
Helping Smaller Businesses Mitigate Risks
How the Remote Workforce Is Changing the Threat Landscape
Identity Security and the Quest for Zero Trust
Improving Security Awareness Training
Improving Threat Detection With AI
Maximize Cybersecurity Risk Ratings in 2019
Microsoft Fixes Target Fresh Flaws Hit by Hackers
President’s Proposed 2020 Budget: Impact on Cybersecurity
Prosecutors Probe Facebook's Data Deals
The 2019 Bank Heists Report
The Business Case for Data Diode Security
The Critical Need for Application Security
Top Security Priority: Detection and Response
Ursnif Banking Trojan Variant Steals More Than Financial Data
Who Faces Biggest Financial Risks From Cyberattacks?
Why Businesses Must Maintain Better Security Foundations
Why CISOs Need Partners for Security Success
Why Smaller Businesses Need Comprehensive Security
Women in Tech: How Are We Doing? How Should We Be Doing?
Georgia County Criticized Over $400K
Ransomware Payment Kevin Townsend is a Senior
Contributor at SecurityWeek. He has been writing about high
tech issues since before the birth of Microsoft.
Attack on Software Giant Citrix Attributed to Iranian Hackers
Cisco Publishes Annual CISO Benchmark Study
Data Breach Cost Marriott $28 Million So Far
Details of Actively Exploited Windows Flaw Made Public
E-Commerce Company Gearbest Leaked User Information
Facebook Faces Criminal Probe of Data Deals: Report
Four Steps to Begin Better Managing Your Digital Risk
G Suite Admins Can Now Disable Phone 2-SV
GDPR - Improving Data Privacy and Cyber Resilience?
GIF Attack on Facebook Messenger Earned Hacker $10,000
Google Took Down 2.3 Billion Bad Ads in 2018
IoT Security Meets Healthcare: What You Need to Know
Leading Israeli Candidate for PM Targeted by Iranian Hackers
Man Admits to Hacking Minnesota Databases Over Cop Acquittal
Many Security Apps on Google Play Inefficient, Fake: Study
NASA's Cybersecurity Program Gets Failing Grade
NATO Takes Huawei Security Concerns Seriously: Stoltenberg
Security Shifts Left to be Part of Software Development Best Practice: Report
Unprotected MongoDB Instance Exposes 800 Million Emails
US Warns of Sophisticated Cyberattacks From Russia, China
Venezuelan 'Cyber-Attack' Possible But Unlikely, Experts Say
Venezuela's Maduro Says Cyber Attack Prevented Power Restoration
Gearbest Misconfiguration Exposes 1.5M Records
News broke that Gearbest, a Chinese online shopping giant,
exposed 1.5 million records on an Elasticsearch server that was
not protected with a password, allowing anyone to search the
database
7 Misconceptions About DDoS Attacks That Could Jeopardize Your Business
809M Records Leaked Via Publicly Accessible MongoDB Database
Blue Whale – Still Offering Advice
Bristol Council Is Phishing Its Own Employees To Improve Security
Cambridge Analytica Scandal - One Year On
Companies Leaking Sensitive Data
Cookie Walls And EU GDPR
Cyber Vulnerability In Car Alarm Opened Millions Of Cars Up To Tracking,
Hijack And Theft
Cybercriminals Leveraging Encryption
Cybersecurity Prediction 2019: 40 Experts Views
Exposed DB Classifies Woman As 'Breed-Ready'
How Cybersecurity Has Changed With The 30th Anniversary Of The WWW
Multiple Vulnerabilities In Moxa Industrial Switches That Are Used To Build
Industrial Networks
New PoS Malware Discovered Targeting The Hospitality And Entertainment
Industry
Phishing Attacks Hook Half Of UK Organisation Over The Past Two Years
Ransomware Attack On The US Committee For Public Counsel Services
The Biometric Smart Card: Connecting The Digitally Excluded
The Cyber Resilience Model
The Three Big Ways iOS App Development Will Change In The Next Five Years
UK Business PCs Have A One In 10 Chance Of Malware Infection In 2019
Why Does A Diversity Gap Persist In Cybersecurity This International Women’s
Day?
Yatron Ransomware Plans To Spread Using EternalBlue NSA Exploits
The buzz at RSA 2019: Cloud security, network
security and more Jon Oltsik is a principal analyst at
Enterprise Strategy Group ESG and has been quoted in the Wall
Street Journal, Business Week, and the New York Times.
6 steps for a solid patch management process
7 cheap or free cyber security training resources
7 hot cybersecurity trends (and 4 going cold)
Cybersecurity education in the age of acceleration
Digital Convergence’s Impact on OT Security
Hackers use Slack to hide malware communications
How to hack a smartcard to gain privileged access
Is the world ready for the next big ransomware attack?
Navigating a challenging cybersecurity skills landscape
One in three organizations suffered data breaches due to mobile devices
Preserving the privacy of large data sets: Lessons learned from the Australian
census
Self-sovereign identity: 3 key questions
The best password advice right now (Hint: It's not the NIST guidelines)
The new CISO's playbook: 5 rules to follow
Top cyber security certifications: Who they're for, what they cost, and which
you need
What are the new China Cybersecurity Law provisions? And how CISOs should
respond
What is ethical hacking? How to get paid to break into computers
What is Mimikatz? And how this password-stealing tool works
What is quantum cryptography? It’s no silver bullet, but could improve
security
What is shadow IoT? How to mitigate the risk
What is the China Cybersecurity Law? And how CISOs should respond
Windows security updates that require new registry keys
5 Key Skills Every Incoming CISO Should Have CISO Hackers Sell Access to Bait-and-Switch Empire
roles – both full-time and fractional – are on the rise. Their skills
can help a growing organization enhance its security program,
keep it on track, and guide in times of crisis and change. Cybercriminals are auctioning off access to customer information
stolen from an online data broker behind a dizzying array of bait-
and-switch Web sites that sell access to a vast range of data
Back to Basics with Cloud Security
Lose Battles, But Win the War: Devising a Grand Strategy for Security
More than Half of RSA Attendees to Increase Mobile Cybersecurity Investment
The Incident Response Approach to Cybersecurity
Ad Network Sizmek Probes Account Breach
Insert Skimmer + Camera Cover PIN Stealer
MyEquifax.com Bypasses Credit Freeze PIN
Patch Tuesday, March 2019 Edition