El Diario del CISO (The CISO Journal) Edición 12 | Page 8
Are Endpoints Integrated Into Your Network Security Strategy?
Breaking down Facebook’s communications playbook
Charter Communications, who can you trust?
Cryptomining, not ransomware, the top malware threat so far this year
Russia is hacking routers in global cyber attacks, US and UK warn
SamSam explained: Everything you need to know about this opportunistic
group of threat actors
Customers describe the impact of the Allscripts ransomware attack
Implementing the NIST cybersecurity framework could be worth at least
$1.4m to your business Technology must be part of solution for empowering rural women and girls
IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention The immature security industry
Top cyber security certifications: Who they're for, what they cost, and which
you need
Is your organization a HITRUST org?
Left-shifting enterprise appsec: what we can learn from mobile app
developers
Nation state attacks – the cyber cold war gets down to business
Overcoming the security challenges of software defined networking
Ransomware, healthcare and incident response: Lessons from the Allscripts
attack
Negative motivation is not positive engagement
Lazy Hackers' Turn To Automated Attack Tools
“Sometimes There Is A Crystal Ball”
Asia And Middle East A Hotbed Of New Threat Actors In Q1, 2018
Asia And Middle East Are Hotbeds For Malicious Cyber Activity
Data Firm Left 48 Million Data Profiles Exposed On AWS Server
Data Visibility: The Antidote To Snake-Bites
From Digital Defiance To Commercial Compliance
Individual DDoS Attacks Can Cost Enterprises US$ 50,000 (£35,000)
Industry Poll Gives Significant Insights Into Businesses’ ‘GDPR Readiness’
March 2018’s Most Wanted Malware: Cryptomining Malware That Works
Outside The Web Browser On The Rise, Says Check Point
The Critical Need for Threat Intelligence
Two incident response phases most organizations get wrong
Want IT resiliency? Stop the see-saw of imbalanced attention
What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and
defenders
McAfee Cloud Report
New Report Reveals Record Levels Of Identity Fraud In 2017
Organisations Preventing 87% Of Focused Cyber Attacks Globally
Positive Technologies Research: Banking And Finance Were The Most
Vulnerable Web Applications in 2017
Pub Giants Wetherspoon Have Shut Down Their Facebook, Instagram And
Twitter Pages
Russian Cyber Threat
Sonatype Survey Reveals Massive Data Breaches Are Catalysts For DevSecOps
Investment
TaskRabbit Takes Down App And Website After Getting Hacked
Telegram Banned In Russia After Refusing To Hand Over Encryption Keys
Threat Of Russian Cyber Attack