El Diario del CISO (The CISO Journal) Edición 12 | Page 11

Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer How CISOs can mitigate the breach affect with GDPR implementation
Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning
Millions of applications risk exposing personal data due to 3rd party code : Research
One in four organisations has experienced data theft from public cloud :
Microsoft built its own custom Linux OS to secure IoT devices
Survey
Suspected ' Big Bitcoin Heist ' Mastermind Fled to Sweden On Icelandic PM ' s
Plane
This is how you can secure cryptocurrency
Techrepublic
Zdnet
10 bits of career wisdom for beginning cybersecurity professionals
Dell changes its approach and goes OS-agnostic in security
5 tips for managing shadow IT without destroying innovation
DHS chief : US to take more aggressive posture against cyber attackers
75 % of consumers won ' t buy your product if they don ' t trust you to protect
their data
Facebook : We ' re not the only ones collecting your data across the web
A year after WannaCry , victims haven ' t improved cybersecurity policies
Who ' s hurt by the ZTE ban ? US consumers and businesses
DHS takes strong stance on hackers as tech firms stand against government
cyberattacks
This is how it feels to face a major cyber attack
Here ' s how much money a business should expect to lose if they ' re hit with a
This malware will take screenshots , steal your passwords and files - and drain
DDoS attack
your cryptocurrency wallet
Here ' s why 81 % of security pros believe their company will be hacked this
year
What ' s the next stage in cybersecurity ? An AI-powered , data-centric model
Report : 100 % of web apps have at least one security vulnerability
Why router-based attacks could be the next big trend in cybersecurity
Information-management
Bleepingcomputer
10 top trends impacting data security
Brainjacking : A Potentially Deadly Type of Hacking
How data breaches affect the corporate bottom line
Crooks Hijack Router DNS Settings to Redirect Users to Android Malware
Overcoming hidden data risks when managing third parties
Data Firm Left Profiles of 48 Million Users on a Publicly Accessible AWS Server
Microsoft offering new tools to better secure MCUs , IoT devices
iOS Trustjacking Attack Exposes iPhones to Remote Hacking
Most firms unprepared for the changes digital transformation brings
More Than Half of Android Apps for Kids Are Violating US Privacy Laws
Russia steps up hacking , spurring U . S . -U. K . warning on risk
TaskRabbit Takes Down App and Website After Getting Hacked
XiaoBa Ransomware Retooled as Coinminer But Manages to Ruin Your Files
U . S . offers $ 25 million cybersecurity grant after gas line pipe attacks
Anyway
Healtcareinfosecurity
Cyberscoop
Art Coviello Talks Breach Detection and Prevention
Lawmakers want to know how to mitigate cyber risk in medical devices
Nation-state hackers attempted to use Equifax vulnerability against DoD , NSA
Embracing Change in Cybersecurity
official says