El Diario del CISO (The CISO Journal) Edición 14 | Page 7

BankinfoSecurity
Darkreading
Other Important News
' Don ' t Extort Us ': Uber Clarifies its Bug Bounty Policy
North Korea ' s AV Software Contains Pilfered Trend ...
10 Security Innovators to Watch
Old Worm , New Tricks : FacexWorm Targets Crypto ...
3 Ways to Maximize Security and Minimize Business ...
Password Reuse Abounds , New Survey Shows
5 Ways to Better Use Data in Security
Ransomware Attacks Jumped 400 % Worldwide in 2017
A Data Protection Officer ' s Guide to GDPR ' Privacy ...
WhatsApp Founder to Depart Facebook Amid Privacy , ...
Are You Protecting Your DevOps Software ' Factory '?
RSA CTO : ' Modernization Can Breed Malice '
Automation Exacerbates Cybersecurity Skills Gap
Slack Releases Open Source SDL Tool
Breaches Drive Consumer Stress over Cybersecurity
Spectre Returns with 8 New Variants
Encryption is Necessary , Tools and Tips Make It Easier
Speed at Which New Drupal Flaw Was Exploited ...
GDPR Requirements Prompt New Approach to Protecting ...
Spring Clean Your Security Systems : 6 Places to Start
Hackers Leverage GDPR to Target Airbnb Customers
Survey Shows Sensitive Data Goes Astray in Email
Inside the Two Types of Account Takeover Attacks
Twitter Alerts Users to Change Passwords Due to ...
LoJack Attack Finds False C2 Servers
We ' re Doing Security Wrong !
More Than 1M Children Victims of Identity Fraud in 2017
What Meltdown and Spectre Mean for Mobile Device ...
No Computing Device Too Small For Cryptojacking
5 Top Cybersecurity Themes at RSA 2018
Hackers Target 3 Mexican Banks ' Real-Time Transfers
A CISO ’ s Role at a Security Company
Headed Toward GDPR Finish Line
Addressing the Lack of Diversity in Cybersecurity
How Triton Malware Targets Industrial Control Systems
Anticipating the Next Phishing Threat
Is Payments Industry Ready for New Encryption Protocols ?
Assessing Third-Party Risk : Why It ’ s Challenging
MSSPs : Separating Myths From Realities
GDPR : Understanding the Complexities
NSA : The Silence of the Zero Days
Battling ‘ Cyberfatigue ’
Plugging Security Into Strategic Customer Initiatives
Besieged Cambridge Analytica Shuts Down
Real-World Application Security : Top 10 Threats
Cryptomining : Threat and Opportunity ?
SamSam Ransomware Offers Volume Decryption Discount
Cybercrime Se Habla Español : Inside the Underground
The Evolution of Phishing
Evolving Regional Threats on the Dark Web
Tips for Implementing Foundational Controls
Facebook Keeps Losing the Privacy Advocates Who Can Save It
Twitter : We Goofed ; Change Your Password Now
Financial Services : Cloudy With a Chance of Data Loss
What GDPR Means for Cybersecurity