El Diario del CISO (The CISO Journal) Edición 13 | Page 8

Global government surveillance: I'll spy for you, if you spy for me How lean development improved software security at Fannie Mae Aviation industry takes steps to mitigate insider threats How to stop threats before they hit your network The best antivirus? Kaspersky leads in latest tests, but that's only part of the story Data and privacy breach notification plans: What you need to know Doing security policies right Fireside Chat with Renesas Electronics: Talking Security & Threat Protection for Connected Cars Bezop Cryptocurrency Server Spills 25K in Private Investor, Promoter Data Europol Smacks Down World's Largest DDoS-for-Hire Market Exploit Targets Nvidia Tegra-Based Nintendo Systems Metamorfo Targets Brazilian Users with Banking Trojans Muhstik Botnet Exploits Highly Critical Drupal Bug Orangeworm Mounts Espionage Campaign Against Healthcare Podcast: Why Manufacturers Struggle To Secure IoT Amplification attacks and old botnets make a comeback Connectivity is driving the manufacturing boom, but beware of unwanted attention Cybersecurity strategies neglected in wake of the boardroom’s quest for digital Department for work and pensions spending nearly £15m on GDPR Ever wondered how to make malware visual...Enter Maltoons! Traditional security defences may prove inadequate for effective GDPR strategies, warns Aruba 13 Year-Old Configuration Flaw Impacts Most SAP Deployments Amazon Alexa Can Be Used for Snooping, Researchers Say Authorities Take Down Largest DDoS Services Marketplace Closing the Gaps that Result in Compromised Credentials Drupal to Release Second Drupalgeddon2 Patch as Attacks Continue Flexibility vs. Security - A False Choice What is a Cybersecurity Technology Platform Anyway? Why data governance should be corporate policy PyRoMine Uses NSA Exploit for Monero Mining and Backdoors Researchers Hacked Amazon's Alexa to Spy On Users, Again Rubella Crimeware Kit: Cheap, Easy and Gaining Traction ThaiCERT Seizes Hidden Cobra Server Linked to GhostSecret, Sony Attacks Uber Tightens Bug Bounty Extortion Policies SamSam Ransomware Evolves Its Tactics Towards Targeting Whole Companies Kaspersky Lab identifies infrastructure of Crouching Yeti known for attacks on industrial companies New malware strain strikes X-ray and MRI systems – how can we cure the security sickness? Synopsys Survey Reveals Only Half of CI/CD Workflows Include Application Security Te sting Elements Take back the initiative on DDoS protection – it’s time to be proactive The cyber intelligence landscape is evolving Hotel Rooms Around the World Susceptible to Silent Breach Internet Exposure, Flaws Put Industrial Safety Controllers at Risk of Attacks New Advanced Phishing Kit Targets eCommerce Picture This. Now Protect It. Ransomware Hits Ukrainian Energy Ministry Website Researchers Dissect Tool Used by Infamous Russian Hacker Group