El Diario del CISO El Diario del CISO (The CISO Journal) Edición 9 | Page 9
News2
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
Cybertalk
Forbes
Council Post: CISOs, Stop Focusing On Cybersecurity
Council Post: Secure Software Design: The Next Frontier In Cybersecurity
ExtraHop BrandVoice: “CIA”: Understand The Cybersecurity Triad In 5
Minutes Or Less
New Cybersecurity Report Warns CIOs -- 'If You're Breached Or Hacked, It's
Your Own Fault'
Buzz about the grid generates uncertainty
Deep Dot Web in deep water
How to avoid the domino effect
Winning strategies for a top-notch CISO and CFO alliance
Information-Management
Inforisktoday
Bad bot cyber attacks increase in number and sophistication
Cyber risk levels hold steady, though larger firms are prime targets
Five software programs to improve the security of business websites
Most organizations ill prepared to defend against cyber attacks
Despite Doxing, Oilrig APT Group Remains a Threat
Hackers Steal, Post Financial Data From Major Corporations
Mystery Database Exposed Info on 80 Million US Households
Deloitte
Securitymagazine
CRO Survey: Risk Management Value, Challenges & Trends
Pursuing cybersecurity maturity at financial institutions
The ascent of the CISO
Physical and Cyber Convergence—At Last?
Social Engineering Simulation Testing Tips
Tipping the Scale for Effective Cybersecurity
Cisomag
Continuous innovation is the key to cyber safety
Kenya announces cybersecurity guidelines for financial sector
$3 Million HIPAA Settlement in Delayed Breach Response Case
Laid Off Worker Pleads Guilty in Medicaid Incident
Dataprivacysecurityinsider
Trendmicro
Diagnostic Medical Imaging Company Pays $3 Million to Resolve Potential HIPAA
Violations Stemming from Data Breach
Phishing Continues to Be Seen as Biggest Cybersecurity Threat to Companies
This Week in Security News: BEC Attacks and Botnet Malware -
This Week in Security News: Skimming Attacks and Ransomware -
Tripwire
Welivesecurity
Cyber Security + Compliance Controls: What Does It All Mean, Rick?
RobbinHood ransomware attack brings down parts of City of Baltimore's computer
network
Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange
Turla LightNeuron: An email too far
Securityboulevar
McAfee Survey Finds IT at Cybersecurity Fault Most
The CEO's Guide To Understanding Cyber
Other News
‘CISOs should be able to reach out’
$40 million worth of Bitcoin stolen from Binance cryptocurrency exchange
A ransomware attack is holding Baltimore's networks hostage
Banks and Their Legal Obligations to Defend Against Cybercri
Be wary of emails with links to ... er, Google Drive? Is that right?
Bootstrap Business: How to Improve Security for Business and Prepare for All Threats
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak
C-level execs being targeted by cyberattacks
Cofense: Why it’s time for everyone to defend against phishing
Crippling ransomware attacks targeting US cities on the rise
Cybersecurity Awareness: A Critical Piece of the Security Puzzle
Cybersecurity Jobs Abound. No Experience Required.
Cybersecurity Skills Shortage Worsening for Third Year In A Row, Sounding the Alarm for
Business Leaders
Evaluaciones de Hogan: los 8 rasgos de personalidad para tener éxito en la ciberseguridad
FBI Seize DeepDotWeb For Taking Commissions From Illegal Sites
FBI Shutters DeepDotWeb Portal; Suspected Admins Arrested
Filling the digital transformation skills gap
Five free ways SMEs can improve their cyber security
Google Online Security Blog: Quantifying Measurable Security
Hackers linked to China repurposed NSA's cyberweapons, report says
Help the Security Effort By Becoming an IoT Researcher
How to Comply with GDPR
How to Get Your Employees On Board with Cyber Security
In the absence of a secure culture, reducing cyber risk could be impossible
Indian corporates seek to bridge skill gap in cyber security management
Invisible Malware Is Here and Your Security Software Can't Catch It
Is anti-virus obsolete?
LulZSec hackers published sensitive data from 30,000 Roman lawyersSecurity Affairs
Marriott doesn't pay a price for massive data breach
Microsoft SharePoint vulnerability allows hackers to sift through servers, Saudi
authorities warn
Millions of Chinese-made devices, including baby monitors, vulnerable to hacking:
study
MN: American Baptist Homes of the Midwest notifies patients and residents of
ransomware incident
Month Long Attack on Microsft SharePoint Servers
NASCIO Day 2: Hard Transformations and ‘Soft’ Skills
Nicaragua: 11,000 Bots Slam La Prensa in 'A Direct Attack'
No reason to ship credit card data to third parties, says expert
Oversight and Management of Cybersecurity Risks for Board of Directors/Decision
Makers
Piracy streaming apps are stuffed with malware
Report: Chinese Hackers First to Use NSA Cyberattack Tools
Russia-Linked Hackers Using Sophisticated Backdoor To Hijack Exchange Servers
Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor
Students pull off below-the-belt mailing list prank
The 4 pillars of a lasting cyber security transformation
The Greatest Risk Is Not Doing a Risk Assessment
The Secret CSO: Roger Hale, Informatica
The State of Cyber Security Incident Response
The Strange Journey of an NSA Zero-Day—Into Multiple Enemies' Hands
Triton is the world’s most murderous malware, and it’s spreading
We aren't prepared for the next wave of cybersecurity risks
Why Cybersecurity Startups are Picking Up Growth in SEA
Why it’s time for organisations to rethink their cybersecurity strategy
Why You Should Constantly Enrich Security Culture Throughout Your Organization
Your Financial Org Needs Security Awareness Training More Than Ever
www.cisos.club
[email protected]