El Diario del CISO (The CISO Journal) Edición 11 2018 | Page 9

Computerweekly Companies must take a share of cloud security responsibility Cyber attackers can breach targets in hours, report reveals Cyber criminals earn up to $2m a year, study shows Cyber security a shared responsibility, says Amber Rudd Mobile phishing a growing threat, warns report New cyber incident classification to boost UK response NSA calls for cyber security community collaboration Ransomware top cyber threat, DBIR shows Security professionals admit patching is getting harder UK cyber attack reporting set to be more streamlined UK to launch crackdown on dark web Thehackersnews Itsecurityguru 31% of Brits have smart security gadgets in the home CISO Chat - Rick Orloff, Chief Security Officer at Code42 Getting buy-in from the Board – advice for CIOs Healthcare will become digitised by 2030 to keep services alive, experts predict Internet of Broken Things? 10 key facts about IoT Malwarebytes Unveils Endpoint Protection and Response to Simplify Endpoint Monitoring, Detection and Remediation Outdated security solutions are putting businesses at risk of evolved cyberthreats Patch Tuesday Commentary, Chris Goettl, Director of Product Management, Security at Ivanti Risk of compromised credentials an HR problem, say senior executives Suppressing the Adversary via Threat Hunt Teams The digital transformation roadblock: existing IAM solutions are creating major barriers to digital technology adoption Techrepublic April 2018 Hacking News Posts Archive — The Hacker News Critical Code Execution Flaw Found in CyberArk Enterprise Password Vault Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks 8 hard truths about working in cybersecurity 82% of cyber pros worry employees don't follow cloud security policies New cryptomining malware doesn't need a browser session to operate Ransomware attacks are on the rise. Should businesses pay up or focus on Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password tightening security? Ransomware reigns supreme in 2018, as phishing attacks continue to trick Hacker Can Steal Data from Air-Gapped Computers through Power Lines employees Hackers Found Using A New Code Injection Technique to Evade Detection Understand the GDPR guidelines for obtaining lawful consent to process data User privacy and data management: Changes to expect in light of the Hackers Have Started Exploiting Drupal RCE Exploit Released Yesterday Facebook debacle When hackers attack a country, they use the same flaws impacting your How to Find Out Everything Facebook Knows About You business Zuckerberg's Facebook testimony: 5 big questions for businesses and Popular Android Phone Manufacturers Caught Lying About Security Updates developers Warning: Your Windows PC Can Get Hacked by Just Visiting a Site Bankinfosecurity ETCISO