El Diario del CISO (The CISO Journal) Edición 10 2018 | Page 7
Delta and Sears suffer data breach, credit card information compromised
Easily exploited flaw in Microsoft Malware Protection Engine allows total
system compromise IT audit best practices: Technological changes give rise to new risks
Access Certification Reviews: There’s Got to be a Better Way Reducing the impact of AI-powered bot attacks
Data Breaches: How Do You Ensure You’re Not Next? RSA Conference: CISOs' top 4 cybersecurity priorities
DHS detects stingrays in DC, but can't find the surveillance devices The best cybersecurity analysts should play the part of detective
Don’t rush to deploy 5G if you want IoT security, agency warns The IoT Threat Can Be Tamed with Internal Communication
GDPR: end user data loss prevention
Half the world is female, so why do women only make up 1% of security
leaders?
How important defense in depth will be as the lines between security layers
blur The rise of mobile phishing attacks and how to combat them
Voting machine vendor firewall config, passwords posted on public support
forum
How to detect and prevent crypto mining malware What happens when half the nation's information gets stolen?
Malicious actors used Facebook's own tools to scrape most users' public info
Most healthcare pros believe their organizations adequately protect patient
Establishing covert communication channels by abusing GSM AT commands data
Fewer records breached: Cybercriminals focus on ransomware, destructive Secure software development practices for developers, organizations and
attacks
technology users
Hackers steal payment card data of 5 million Saks, Lord & Taylor customers Security teams are under resourced, overwhelmed by attackers
How companies continue to expose sensitive data to threats
What's new at RSAC 2018?
How critical infrastructure operators rate their security controls
Would automation lead to improved cybersecurity?
1.5 Billion Sensitive Documents on Open Internet: Researchers
Intel Discontinues Keyboard App Affected by Critical Flaws
Best Buy Hit by [24]7.ai Payment Card Breach
IoT Security Firm Red Balloon Raises $22 Million
Breaches Increasingly Discovered Internally: Mandiant
Mitigating Digital Risk from the Android PC in Your Pocket
Companies Have Little Control Over User Accounts and Sensitive Files: Study Necurs Botnet to Erupt This Month?
Critical Flaws Expose Natus Medical Devices to Remote Attacks
New Monero-Mining Android Malware Discovered
Facebook Says 87 Million May be Affected by Data Breach
New Strain of ATM Jackpotting Malware Discovered
Facebook to Offer 'Clearer' Terms on Privacy, Data Use
North Korean Hackers Behind Online Casino Attack: Report
Facebook's Sandberg Says Other Cases of Data Misuse Possible
Researchers Link New Android Backdoor to North Korean Hackers
Financial Services DDoS Attacks Tied to Reaper Botnet
Security for the Ages: Make it Memorable
Hacked Magento Sites Steal Card Data, Spread Malware
Why Multi-cloud Security Requires Rethinking Network Defense
Improved Visibility a Top Priority for Security Analysts
Would Facebook and Cambridge Analytica be in Breach of GDPR?
In Modern Data Centers Security Must Take Center Stage
What hackers do: their motivations and their malware