El Diario del CISO (The CISO Journal) Edición 11 2018 | Page 7

Securityweek CSOOnline
Fraudsters Are Stealing Corporate Funds with Tampered Debit Cards
Vevo YouTube Channels Suffer Music Video Hack
GDPR Privacy Policy Fail : Only 34 % of EU Sites Compliant
YouTube Suffers Music Video Hack
4 steps to creating a winning cybersecurity strategy in 2018
New CSO , CISO appointments
5 myths of API security
Protecting Mobile Devices Requires Training and Technology
6 steps for a solid patch management process
Ransomware incidents double , threatening companies of all sizes
9 policies and procedures you need to know about if you ’ re starting a new
security program
Reputational risk and social media : When you ' re blocked without notice
Adobe ’ s CSO talks security , the 2013 breach , and how he sets priorities
SirenJack : Emergency alert sirens can be hacked using a radio , laptop
Allscripts recovering from ransomware attack that has kept key tools offline
Social engineering : It ' s time to patch the human
Alternative communications planning and cybersecurity incident response
Software-defined perimeter : Important initiative , ineffective name
CIS Controls Version 7 – What ’ s Old , What ’ s New
The CSO guide to top security conferences
Cloud security will ( and should ) dominate the RSA Conference
The value of 20 / 20 hindsight in cybersecurity
Facebook secretly tried to get hospitals to share patient data
Threat intelligence is only intelligence if you use it
Hackers abused Cisco flaw to warn Iran , Russia about election meddling
Turbo-charging your single sign-on solution
How to hire the right analysts for your intelligence program
Microsegmentation evolves into a compensating control security tool
Key articles in the GDPR for the enterprise
Why organizations need business-centric data protection
' Operation Parliament ' Imitates Another Actor to Stay Undetected
Industrial Internet Consortium Develops New IoT Security Maturity Model
Information Security News , IT Security News and Cybersecurity Insights :
25 Million U . S . Individuals Impacted by 2016 Uber Hack
SecurityWeek
A Deep Dive into Decision Advantage
Key Points From Facebook-Zuckerberg Hearings
Adobe Patches Vulnerabilities in Six Products
Malware Activity Slows , But Attacks More Sophisticated : Report
AMD , Microsoft Release Spectre Patches
Microsoft Patches Two Dozen Critical Flaws in Windows , Browsers
Britain Says Russia Spied on Skripals Before Poisoning
Mobile Phishing Attacks Up 85 Percent Annually
Business-Critical Systems Increasingly Hit by Ransomware : Verizon 2018
DBIR
SirenJack : Hackers Can Remotely Trigger Warning Sirens
Cisco Switches in Iran , Russia Hacked in Apparent Pro-US Attack
Top Music Videos Including ' Despacito ' Defaced by Hackers
Considering The Complexities of Hack Back Laws
U . K . Launched Major Cyberattack on Islamic State : Spy Chief
Critical Infrastructure Threat Is Much Worse Than We Thought
Vulnerabilities Found in Linux ' Beep ' Tool
Electrical Substations Exposed to Attacks by Flaws in Siemens Devices
What Social Media Platforms And Search Engines Know About You
Why Mass Transit Could Be the Next Big Target for Cyber Attacks — and What
Facebook to Offer ' Bounty ' for Reporting Data Abuse
to do About it
Hackers Can Stealthily Exfiltrate Data via Power Lines
Have We Reached Data Breach Fatigue ?