El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 10

News2.1 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Cyberdefensemagazine ITgovernance Are the C-suite and security teams on the same page? Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector Cross-site Scripting Is an Underrated Vulnerability How to stand be Workforce Ready and Standout with Cyber security Hiring Managers Shattered! Security in a Fragmented World of Workloads Average cost of cyber crime is now $13 million Do you have a data breach response plan? Infographic: List of data breaches in 2018 What are the best books on data privacy? What is the Data Protection Act 2018? Techrepublic Dataprivacysecurityinsider 3 things you need in a cybersecurity awareness training plan How companies can diversify their cybersecurity teams Quantum computing: The biggest cybersecurity threats Top 3 reasons cybersecurity pros are changing jobs What to include in an enterprise cybersecurity plan Data Privacy and Security Contractual Provisions Financial Industry Getting Hammered with Cyber-Attacks Jackson County, Georgia Pays Hackers $400,000 After Ransomware Attack Misconfigured Box Accounts Can Expose Data Other News Head of Security Architecture discusses the Cyber Security Report 2019 ‘Password spraying’ behind Citrix cyber attack ‘Ransomware’ attack on Lucknow’s 5-star hotel, cyber-cell grapples for clues 2019 Technology Spending Intentions 5 Key Skills Every Incoming CISO Should Have A CISO is an innovation catalyst within the organization A Cybersecurity Drought Is Coming A Look Back at the 2018 Security Landscape A new rash of highly covert card-skimming malware infects ecommerce sites A Pesticide-Free Podcast Made with 'All Natural' Intelligence A predatory tale: Who’s afraid of the thief? Advanced phishing tactics reel in a massive catch Analysis of Ransomware Epidemic In February 2019 Are Your Employees Really Engaging With Security Awareness Training? Back to Basics with Cloud Security Beauty Out of Chaos: Elevating Cybersecurity to an Art Form Breach of 'Verifications.io' Exposes 763 Million Records CISO Confidential: How to Secure a Publicly Traded Company CISOs on the Board and 5 Actions They Should Take Citrix admits attackers breached its network – what we know Citrix Hacked - Terabyte of Sensitive data Stolen by Iranian Hackers Citrix hackers may have stolen six terabytes worth of files Citrix security breach sees 6TB of sensitive data stolen Collaborative Work Management Platform Wrike Bolsters Security Offering. Creepy Database Lists 'BreedReady' Status for 1.8 Million Women Cyber attacks could help trigger a war, says Marise Payne Cyber expert explains the risks of smart devices Cyber in the 2020 budget -- FCW Cyber security: time to get serious? – Alan Calder on IT Governance, Cyber Resilience, ISO 27001 and Brexit Cybersecurity Career Q&A with CIS’ CISO Cybersecurity Hygiene: Not a Dirty Little Secret for Long Cybersecurity Insurance Not Paying for NotPetya Losses Cybersecurity Is Putting Customer Trust at the Center of Competition Cybersecurity risk in retail and how to handle it Cybersecurity should be a source of hope, not fear. Here are 5 reasons why Dark Web Marketplace Offering Major Ad Platform Login Data Loss Detection DevSecOps: How to Build Security into Apps DHS to focus on cybersecurity basics ahead of 2020 election, cyber head says Diversity Matters – The Case for Inclusivity in Cybersecurity Energy's cyber office gets a boost EU to pool and network its cybersecurity expertise Fake DHL Urgent Delivery notice delivers Gandcrab 5.2 ransomware FBI director calls for public-private cybersecurity partnerships February 2019’s most wanted malware: Coinhive quits while still at the top Feedspot GCSE coursework lost in cyber attack on Bridport school Georgia County Pays $400,000 to Ransomware Attackers Georgia paid half a million dollars to hackers after ransomware attack Google: Phishing Attacks That Can Beat Two-Factor Are on the Rise Hackable car alarms leave three million cars at risk of hijack Hackers cop a FILA thousands of UK card deets after slinking onto clothing brand's servers • The Register Hackers Easily Can Reach Education Data Breach Health Data Hacking Incident Affects 400,000 Healthcare CISOs Must Understand Source of Threats to Combat Cyber Attacks How Blockchain Can Improve InfoSec How Often Should Employees Go Through Security Awareness Training? How to Create a Small Business Cybersecurity Strategy IBM Report Details Shifting Cybersecurity Threat Landscape Incident Notification Requirements in the EU's NIS Directive Information Security Staffing Guide Inside the Emotet Banking Trojan and Malware Distributor Intel Fixes High Severity Vulnerabilities in Graphics Driver for Windows International Women’s Day: Supporting gender diversity in cybersecurity, putting the skills gap into the history books Investment Adviser’s View of Cybersecurity Market Iranian hackers stole terabytes of data from software giant Citrix Japan spearheads pan-Asia alliance to tackle cybersecurity Latest Pakistan bank-card fraud looks like an actual breach, researchers say - CyberScoop Lose Battles, But Win the War: Devising a Grand Strategy for Security Man arrested for selling one million Netflix, Spotify, Hulu passwords Mental Healthcare Providers Respond to Ransomware Attacks ML and AI in cyber security: real opportunities overshadowed by hype Monday review – the hot 21 stories of the week Monday review – the hot 25 stories of the week More than Half of RSA Attendees to Increase Mobile Cybersecurity Investment NASA's crap infosec could be 'significant threat' to space ops • The Register Nasty WinRAR bug is being actively exploited to install hard-to-detect malware Nation-state threats grow more sophisticated, converge on targets Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts New strain of ransomware spreads using NSA’s EternalBlue exploit. New Zero-day flaw in Google Chrome Discovered Actively Exploited in the Wild North Korea Is Still Trying to Hack US Critical Infrastructure Pakistani Government Site Compromised, Logs Visitor Keystrokes Petya Defense seen as False Positive Petya Dete... Researchers Find Critical Backdoor in Swiss Online Voting System Researchers found over 40 bugs in blockchain platforms in 30 days Rising Tensions Between IT and End-Users Over Unauthorized Collaboration Tools RSA 2019: Making the case for agile cybersecurity RSA Conference: How to get more women into cyber security Security and Privacy vs. Innovation: The Great Balancing Act SimBad Android Adware found in 206 Applications on Google Play Store Six steps toward cybersecurity Smashing Security podcast: Hijacked homes, porn passports, and ransomware regret Spotting Insider Breaches: Employees Can Help Students aren't aware of cybersecurity career opportunities The Biggest Hacking Risk? Your Employees The Incident Response Approach to Cybersecurity The Must-Haves for Your Data Center Cybersecurity Checklist The not-so-secret ingredient for accelerating your business The Top 10 Sessions to Catch at RSA Conference 2019 The youthful CISO This Week in Security News: IoT Threats and Risks Thousands of patients impacted by ransomware attack at medical billing company Three Factors to Smart City Security (Contributed) Tips to boost your cyber security as hackers get smarter, bolder Top 10 Takeaways from RSA Conference 2019 Top Navy Admiral Warns of Cyber Attacks Against Brass Top seven security and risk management trends for 2019 Treasure trove of hacking tools discovered on eBay Triton is the world’s most murderous malware, and it’s spreading Update now! Microsoft’s March 2019 Patch Tuesday is here Vulnerability Summary for the Week of March 4, 2019 WebAuthn: What you need to know about the future of the passwordless Web What Universities Can Do to Limit the Cybersecurity Risk of Personal Devices on Campus What you need to know for Patch Tuesday, March 2019 Why a Well-defined Cyber-security Framework is Crucial For Data Security? Why Cyber Teams Must Focus on Cybersecurity Basics Why password managers are not all they're cracked up to be Women Represent 20 Percent Of The Global Cybersecurity Workforce In 2019 Zero Day Initiative — The March 2019 Security Update Review