El Diario del CISO El Diario del CISO (The CISO Journal) Edición 6 | Page 8

News1.1 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Ransomware Attack on Vendor Affects 600,000 A ransomware attack last fall on a company that provides billing and other business services to health plans and hospitals A Vision of the Role for Machines in Security Are Autonomous Vehicles Trustworthy? Art Coviello on the 2019 State of Security Citrix Hacked by Password-Spraying Attackers, FBI Warns Consumer Privacy: Reasons for Optimism As Well As Concern Cybercrime Disruption: The Role of Threat Research Cybersecurity Comes to the Mid-Market Digital Transformation Needs Security Transformation, Too FBI’s Wray on China’s Counterintelligence Capabilities Fresh POS Malware Strikes Small and Midsize Companies GDPR: Still Plenty of Lessons to Learn Hackers Love to Strike on Saturday Helping Smaller Businesses Mitigate Risks How the Remote Workforce Is Changing the Threat Landscape Identity Security and the Quest for Zero Trust Improving Security Awareness Training Improving Threat Detection With AI Maximize Cybersecurity Risk Ratings in 2019 Microsoft Fixes Target Fresh Flaws Hit by Hackers President’s Proposed 2020 Budget: Impact on Cybersecurity Prosecutors Probe Facebook's Data Deals The 2019 Bank Heists Report The Business Case for Data Diode Security The Critical Need for Application Security Top Security Priority: Detection and Response Ursnif Banking Trojan Variant Steals More Than Financial Data Who Faces Biggest Financial Risks From Cyberattacks? Why Businesses Must Maintain Better Security Foundations Why CISOs Need Partners for Security Success Why Smaller Businesses Need Comprehensive Security Women in Tech: How Are We Doing? How Should We Be Doing? Georgia County Criticized Over $400K Ransomware Payment Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. Attack on Software Giant Citrix Attributed to Iranian Hackers Cisco Publishes Annual CISO Benchmark Study Data Breach Cost Marriott $28 Million So Far Details of Actively Exploited Windows Flaw Made Public E-Commerce Company Gearbest Leaked User Information Facebook Faces Criminal Probe of Data Deals: Report Four Steps to Begin Better Managing Your Digital Risk G Suite Admins Can Now Disable Phone 2-SV GDPR - Improving Data Privacy and Cyber Resilience? GIF Attack on Facebook Messenger Earned Hacker $10,000 Google Took Down 2.3 Billion Bad Ads in 2018 IoT Security Meets Healthcare: What You Need to Know Leading Israeli Candidate for PM Targeted by Iranian Hackers Man Admits to Hacking Minnesota Databases Over Cop Acquittal Many Security Apps on Google Play Inefficient, Fake: Study NASA's Cybersecurity Program Gets Failing Grade NATO Takes Huawei Security Concerns Seriously: Stoltenberg Security Shifts Left to be Part of Software Development Best Practice: Report Unprotected MongoDB Instance Exposes 800 Million Emails US Warns of Sophisticated Cyberattacks From Russia, China Venezuelan 'Cyber-Attack' Possible But Unlikely, Experts Say Venezuela's Maduro Says Cyber Attack Prevented Power Restoration Gearbest Misconfiguration Exposes 1.5M Records News broke that Gearbest, a Chinese online shopping giant, exposed 1.5 million records on an Elasticsearch server that was not protected with a password, allowing anyone to search the database 7 Misconceptions About DDoS Attacks That Could Jeopardize Your Business 809M Records Leaked Via Publicly Accessible MongoDB Database Blue Whale – Still Offering Advice Bristol Council Is Phishing Its Own Employees To Improve Security Cambridge Analytica Scandal - One Year On Companies Leaking Sensitive Data Cookie Walls And EU GDPR Cyber Vulnerability In Car Alarm Opened Millions Of Cars Up To Tracking, Hijack And Theft Cybercriminals Leveraging Encryption Cybersecurity Prediction 2019: 40 Experts Views Exposed DB Classifies Woman As 'Breed-Ready' How Cybersecurity Has Changed With The 30th Anniversary Of The WWW Multiple Vulnerabilities In Moxa Industrial Switches That Are Used To Build Industrial Networks New PoS Malware Discovered Targeting The Hospitality And Entertainment Industry Phishing Attacks Hook Half Of UK Organisation Over The Past Two Years Ransomware Attack On The US Committee For Public Counsel Services The Biometric Smart Card: Connecting The Digitally Excluded The Cyber Resilience Model The Three Big Ways iOS App Development Will Change In The Next Five Years UK Business PCs Have A One In 10 Chance Of Malware Infection In 2019 Why Does A Diversity Gap Persist In Cybersecurity This International Women’s Day? Yatron Ransomware Plans To Spread Using EternalBlue NSA Exploits The buzz at RSA 2019: Cloud security, network security and more Jon Oltsik is a principal analyst at Enterprise Strategy Group ESG and has been quoted in the Wall Street Journal, Business Week, and the New York Times. 6 steps for a solid patch management process 7 cheap or free cyber security training resources 7 hot cybersecurity trends (and 4 going cold) Cybersecurity education in the age of acceleration Digital Convergence’s Impact on OT Security Hackers use Slack to hide malware communications How to hack a smartcard to gain privileged access Is the world ready for the next big ransomware attack? Navigating a challenging cybersecurity skills landscape One in three organizations suffered data breaches due to mobile devices Preserving the privacy of large data sets: Lessons learned from the Australian census Self-sovereign identity: 3 key questions The best password advice right now (Hint: It's not the NIST guidelines) The new CISO's playbook: 5 rules to follow Top cyber security certifications: Who they're for, what they cost, and which you need What are the new China Cybersecurity Law provisions? And how CISOs should respond What is ethical hacking? How to get paid to break into computers What is Mimikatz? And how this password-stealing tool works What is quantum cryptography? It’s no silver bullet, but could improve security What is shadow IoT? How to mitigate the risk What is the China Cybersecurity Law? And how CISOs should respond Windows security updates that require new registry keys 5 Key Skills Every Incoming CISO Should Have CISO Hackers Sell Access to Bait-and-Switch Empire roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. Cybercriminals are auctioning off access to customer information stolen from an online data broker behind a dizzying array of bait- and-switch Web sites that sell access to a vast range of data Back to Basics with Cloud Security Lose Battles, But Win the War: Devising a Grand Strategy for Security More than Half of RSA Attendees to Increase Mobile Cybersecurity Investment The Incident Response Approach to Cybersecurity Ad Network Sizmek Probes Account Breach Insert Skimmer + Camera Cover PIN Stealer MyEquifax.com Bypasses Credit Freeze PIN Patch Tuesday, March 2019 Edition