El Diario del CISO (The CISO Journal) Edición 17 | Page 11

What Is GDPR and Why Should You Care? Malwarebytes CrackMe 2: contest summary Careerinfosecurity Zdnet GDPR Compliance for US Healthcare: What You Need to Know Google, Facebook hit with serious GDPR complaints: Others will be soon Malware campaign expands to add cryptocurrency mining and iOS phishing attacks Malware Attacks: A Tale of Two Healthcare Incidents Medical Device Cybersecurity: A Progress Report Theregister Securityledger EU considers baking new norms of cyber-war into security policies GDPRmageddon: They think it's all over! Protip, it has only just begun Episode 97: On eve of GDPR frightening lack of data privacy, security in US Everybody reboot! VPNFilter Malware infects 500k Routers SCmagazineUK Infosecinstitute DNS flaw allows hackers to change DNS settings in 800,000 Draytek routers Greenwich University Breach costs university £120,000 Closing the Gender Gap: Women in Cybersecurity NIST CyberSecurity Framework Securityintelligence Cybersecurity Threats: 85 Percent of Security Professionals Predict a Major Attack Department of Homeland Security's National Cybersecurity Strategy Simple News 16-30 April 2018 Cyber Attacks Timeline 20 years on, L0pht hackers return to D.C. with dire warnings 3 Business Departments Your Cyber Security Team Should Engage Now to Improve Information Security 500,000+ Devices in 54 Countries Infected With Malware A holistic take on cybersecurity Analysis: Why You Need the Cybersecurity Framework As supply chain attacks surge, people hold the key to tighter security Become a Chief Information Security Officer (CISO) CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman CISO Survey Shows Importance of Threat Hunting in the Finance Sector CISOs and GDPR: The Top 3 Concerns CISOs not investing in insider threat defences Communicating About Cybersecurity in Plain English Congress Continues Push on Medical Device Cybersecurity Mandates Cybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable Cybersecurity 101: Your End-Users are the First Line of Defense www.hackmageddon.com www.the-parallax.com deltarisk.com fortune.com www.forbesindia.com www.techwire.net www.information-age.com www.businessnewsdaily.com rafeeqrehman.com www.cisoforum.com www.hackerone.com www.itweb.co.za zeltser.com www.hklaw.com www.iot-now.com www.cio.com