El Diario del CISO (The CISO Journal) Edición 10 2018 | Page 7

Delta and Sears suffer data breach, credit card information compromised Easily exploited flaw in Microsoft Malware Protection Engine allows total system compromise IT audit best practices: Technological changes give rise to new risks Access Certification Reviews: There’s Got to be a Better Way Reducing the impact of AI-powered bot attacks Data Breaches: How Do You Ensure You’re Not Next? RSA Conference: CISOs' top 4 cybersecurity priorities DHS detects stingrays in DC, but can't find the surveillance devices The best cybersecurity analysts should play the part of detective Don’t rush to deploy 5G if you want IoT security, agency warns The IoT Threat Can Be Tamed with Internal Communication GDPR: end user data loss prevention Half the world is female, so why do women only make up 1% of security leaders? How important defense in depth will be as the lines between security layers blur The rise of mobile phishing attacks and how to combat them Voting machine vendor firewall config, passwords posted on public support forum How to detect and prevent crypto mining malware What happens when half the nation's information gets stolen? Malicious actors used Facebook's own tools to scrape most users' public info Most healthcare pros believe their organizations adequately protect patient Establishing covert communication channels by abusing GSM AT commands data Fewer records breached: Cybercriminals focus on ransomware, destructive Secure software development practices for developers, organizations and attacks technology users Hackers steal payment card data of 5 million Saks, Lord & Taylor customers Security teams are under resourced, overwhelmed by attackers How companies continue to expose sensitive data to threats What's new at RSAC 2018? How critical infrastructure operators rate their security controls Would automation lead to improved cybersecurity? 1.5 Billion Sensitive Documents on Open Internet: Researchers Intel Discontinues Keyboard App Affected by Critical Flaws Best Buy Hit by [24]7.ai Payment Card Breach IoT Security Firm Red Balloon Raises $22 Million Breaches Increasingly Discovered Internally: Mandiant Mitigating Digital Risk from the Android PC in Your Pocket Companies Have Little Control Over User Accounts and Sensitive Files: Study Necurs Botnet to Erupt This Month? Critical Flaws Expose Natus Medical Devices to Remote Attacks New Monero-Mining Android Malware Discovered Facebook Says 87 Million May be Affected by Data Breach New Strain of ATM Jackpotting Malware Discovered Facebook to Offer 'Clearer' Terms on Privacy, Data Use North Korean Hackers Behind Online Casino Attack: Report Facebook's Sandberg Says Other Cases of Data Misuse Possible Researchers Link New Android Backdoor to North Korean Hackers Financial Services DDoS Attacks Tied to Reaper Botnet Security for the Ages: Make it Memorable Hacked Magento Sites Steal Card Data, Spread Malware Why Multi-cloud Security Requires Rethinking Network Defense Improved Visibility a Top Priority for Security Analysts Would Facebook and Cambridge Analytica be in Breach of GDPR? In Modern Data Centers Security Must Take Center Stage What hackers do: their motivations and their malware