El Diario del CISO El Diario del CISO (The CISO Journal) Edición 7 | Page 10
News2.1
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Bitdefender
Cbroline
Aluminium plants hit by cyber-attack, global company turns to manual
operations
Popular family tracking app exposed real-time location data onto the internet –
no password required
Top 5 Cybersecurity Courses and Certifications, from
Simplilearn
Ursnif Malware Changing C2 Infrastructure Every 12 Hours
Cybertalk
Fortinet
Blueprints for tracing cybercrime might involve paw prints
Thinking outside-of-the-box with hackathons
Getting in Front of Cyber Risk: An Interview with Fortinet’s CISO Phil
Quade
The Security Challenge of Cloud Sprawl
Thecisocollective
Securityroundtable
3 Key Things a CISO Needs to Ensure Their CEO Know About Cybersecurity
Geopolitical Attacks Are a Concern for 75% of CEOs
2018-2019 Marks a Turning Point in Data Privacy Policy
Remember That IoT Is Physical—Not Cyber
Other Niews
3 Key Things a CISO Needs to Ensure Their CEO Know About Cybersecurity
6 Lessons Learned From The Citrix Breach
6 Predictions for the Future of Consumer Cyber Security
9 ways to address the IT retirement boom
A Busy IT Infrastructure Can Lead to Security Disaster
An effective IT leader is a connected leader
bellingcat - Locating The Netherlands' Most Wanted Criminal By Scrutinising
Instagram
Command & Control: Silenttrinity Post-Exploitation Agent
Cyber attack on Dubai school network, parents warned
Cyber Risks and High-frequency Trading: Conversation with an Insider
Cybersecurity for healthcare more critical than ever before
Data Ethics – What Would You Do? Step Up or Step Away
Devicemaker Zoll data breach exposes 277K patients' data
Encryption is the new favorite tool of cybercriminals
Future of Risk in the Digital Era
Geopolitical Attacks Are a Concern for 75% of CEOs
Google and Facebook scammed out of $123M by man posing as hardware
vendor
Hackers used Scanbox framework to hack Pakistani Govt’s passport application
tracking siteSecurity Affairs
Here's how cybersecurity vendors drive the 'hacking' news cycle
How Lockergoga took down Hydro — ransomware used in targeted attacks
aimed at big business
Hydro working hard to recover following ransomware attack
Internet Crime Complaint Center (IC3)
Is a lack of cyber due diligence putting your deal at risk?
IT security budgets are falling
Malware Attack on Asus Computers Raises Concerns
Monday review – the hot 29 stories of the week
NACD BoardTalk
North Korea-backed hackers intensify information warfare, financial theft
OIG: NASA’s Poor Cybersecurity is Operational Threat
Oregon state agency suffers data breach, potentially exposing personal
information
Plugging the cybersecurity skills gap with security automation
Postcards from the Post-HTTP World
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
Ransomware Forces Two Chemical Companies to Order ‘Hundreds of
New Computers’
Ransomware, Cryptojacking, and Fileless Malware: The Big Three
Threats
Skills that you require to pursue a career in cybersecurity
Snappy Answers to 6 Major Cybersecurity Questions
Special Report: K-12 Cybersecurity: Big Threats and Best Practices
Talos Blog
The Effective CISO Needs More Than a Control Framework
The odd case of a Gh0stRAT variant
Time to Repeal Law Shielding Posting Inappropriate Content Online
Twitter as an information battlefield – Venezuela; a case study
U.S. Warns of N.Korean Cyber Warfare
UN Security Council panel finds Cosmos Bank cyber attack motivated by
N Korea
Venezuelan Pro-Regime Accounts Publish Personal Data of Phishing
Victims
Virus attacks Spain's defense intranet, foreign state suspected: paper
Virus Shuts Down North Carolina County's Computer Network
Want a career in Cybersecurity? Ask yourself these questions to know
for sure
Weekly Security News from Avast: Week of 2019-03-22
What is Zero Trust Identity Security? How Can You Implement It?
When Is a Data Breach a Data Breach?
Why Organizations Need an RBAC Security Model
Women and Nonbinary People in Information Security: Magda Chelly
Yahoo is now part of Oath
Your Out-of-the-Box Security Awareness Training Program Won’t
Work—and Here’s Why