El Diario del CISO (The CISO Journal) Edición 11 2018 | Page 9
Computerweekly
Companies must take a share of cloud security responsibility
Cyber attackers can breach targets in hours, report reveals
Cyber criminals earn up to $2m a year, study shows
Cyber security a shared responsibility, says Amber Rudd
Mobile phishing a growing threat, warns report
New cyber incident classification to boost UK response
NSA calls for cyber security community collaboration
Ransomware top cyber threat, DBIR shows
Security professionals admit patching is getting harder
UK cyber attack reporting set to be more streamlined
UK to launch crackdown on dark web
Thehackersnews
Itsecurityguru
31% of Brits have smart security gadgets in the home
CISO Chat - Rick Orloff, Chief Security Officer at Code42
Getting buy-in from the Board – advice for CIOs
Healthcare will become digitised by 2030 to keep services alive, experts
predict
Internet of Broken Things? 10 key facts about IoT
Malwarebytes Unveils Endpoint Protection and Response to Simplify Endpoint
Monitoring, Detection and Remediation
Outdated security solutions are putting businesses at risk of evolved
cyberthreats
Patch Tuesday Commentary, Chris Goettl, Director of Product Management,
Security at Ivanti
Risk of compromised credentials an HR problem, say senior executives
Suppressing the Adversary via Threat Hunt Teams
The digital transformation roadblock: existing IAM solutions are creating
major barriers to digital technology adoption
Techrepublic
April 2018 Hacking News Posts Archive — The Hacker News
Critical Code Execution Flaw Found in CyberArk Enterprise Password Vault
Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks
8 hard truths about working in cybersecurity
82% of cyber pros worry employees don't follow cloud security policies
New cryptomining malware doesn't need a browser session to operate
Ransomware attacks are on the rise. Should businesses pay up or focus on
Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password tightening security?
Ransomware reigns supreme in 2018, as phishing attacks continue to trick
Hacker Can Steal Data from Air-Gapped Computers through Power Lines
employees
Hackers Found Using A New Code Injection Technique to Evade Detection
Understand the GDPR guidelines for obtaining lawful consent to process data
User privacy and data management: Changes to expect in light of the
Hackers Have Started Exploiting Drupal RCE Exploit Released Yesterday
Facebook debacle
When hackers attack a country, they use the same flaws impacting your
How to Find Out Everything Facebook Knows About You
business
Zuckerberg's Facebook testimony: 5 big questions for businesses and
Popular Android Phone Manufacturers Caught Lying About Security Updates developers
Warning: Your Windows PC Can Get Hacked by Just Visiting a Site
Bankinfosecurity
ETCISO