El Diario del CISO (The CISO Journal) Edición 10 2018 | Page 12

Facebook and Twitter may be forced to identify bots Gen II security will not save your company from a Gen V cyber attack Hackers gaining access to U.S. energy systems 'to test our response' Humans of InfoSec: A New Security Podcast IBM X-Force Report: Fewer Records Breached In 2017 As Cybercriminals Focused On Ransomware And Introducing the 2018 Trustwave Global Security Report Lord & Taylor & Saks customers payment cards stolen, sold on Dark Web Mark Zuckerberg hits back at Tim Cook Mark Zuckerberg to testify at Congress on Cambridge Analytica, privacy McAfee finds that gamers are strong candidates for cybersecurity jobs Mirai-Variant IoT Botnet Used to Target Financial Sector in January 2018 More than money: How to woo cybersecurity professionals New risk management framework expected to improve DoD cybersecurity New, Bigger DDoS Attacks OPM Says Agencies Have One Year To ID Cyber Workforce Gaps Pipeline Attacks highlight Third Party Threat to Critical Infrastructure Podcast Episode 90: WannaCry zombie haunts Boeing, UL tests for cyber security and Harvard war games election hacking PwC's Kevin Campbell On Why Cybersecurity Responsibility Lays With the C-Suite First Ransomware: A ‘Soft Nuclear Weapon’ Aimed at Government Russia Attacked the US Power Grid for Two Years. Now What? Improper Data Sharing With Cambridge Analytica May Affect 87 Million Facebook Users ServiceNow Research Uncovers Security’s Patching Paradox Two Steps to a Robust Security Culture Unconventional Thinking — Four Practices to Help Mitigate Risk We're in a 'constant state of cyber conflict,' says international expert What Every Business Should Know About Social Engineering Cyber-Attacks What is a privacy engineer? What's Needed to Secure the Industrial IoT Women in Information Security: Amanda Berlin nakedsecurity.sophos.com www.businessdayonline.com www.chron.com blog.cobalt.io www.prnewswire.com www.trustwave.com www.hackread.com money.cnn.com www.cnet.com venturebeat.com www.recordedfuture.com www.ciodive.com federalnewsradio.com www.pivotpointsecurity.com www.nextgov.com securityledger.com securityledger.com hypepotamus.com www.governing.com www.realclearenergy.org www.dataprivacyandsecurityinsider.com www.businesswire.com blog.isc2.org www.infosecisland.com www.itworldcanada.com www.lbmcinformationsecurity.com iapp.org www.eetimes.com www.tripwire.com