El Diario del CISO (The CISO Journal) Edición 14 | Page 8
A first quarter look at cybercrime
Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of
crowds
Apple means business when protecting intellectual property
Why you need both authorization and authentication
Avoiding split-brain scenarios for security solutions
Can Shadow IT Be Good for Enterprises?
Car hackers find remotely exploitable vulnerabilities in VW, Audi cars
Cloud computing security chaos continued at RSA Conference 2018
Cyberwar: Silicon Valley’s new bright, shiny thing
DOD releases new guidance giving teeth to cybersecurity rules to protect
data within the supply chain
Evaluating patch management software: 6 key considerations
#BSidesScot: Cybersecurity Needs to be Optimistic on Achievements
A Quarter of UK CNI Firms Suffered Cyber-Attack Outages
AI Is Not an Easy Fix to Real Staffing Problems
Airbnb Customers Targeted with Phishing Scam
Attack-Simulation Tool Protects Financial Services
Will Warren's Love of Labour Quiet Alleged Breach?
City of London Police Takes Cybercrime Fight to Businesses
Cyrpto Me0wing, Not a Cute Kitty of the Internet
Dark Web Shop Sells Travel Reward Credentials
Data Breaches, Secure Passwords Stress Consumers
Facebook Set to Allow Users to ‘Clear History’
Feeling Down? China Monitors Brain with Headgear
Fraud Attempts Hit 210 Million in Q1
High Court Rules Part of Snoopers’ Charter Illegal
Jordan Hamlett Jailed for Attempts to Access Trump Tax Returns
Exploring the paradigm shift from backup to data protection
GDPR-defined personal data can be hard to find—here's where to look
GDPR: one size does not fit all
Hackers protest Georgia’s anti-hacking bill by hacking Georgia sites
Why securing containers and microservices is a challenge
North Korean anti-virus uses old Trend Micro components
Reduce cloud IT management headaches by approaching IAM the right way
Salted Hash Ep 24: Defending against mobile threats
Why mid-market companies face a tougher road with the GDPR
How the General Data Protection Regulation (GDPR) Will Specifically Affect
Healthcare
‘Managing The Security Skills Gap In A Cybersecurity Minefield’ Majority of Industrial Networks Vulnerable to Attack
NATO Triumphs in Locked Shields Cyber Defense Exercise
Nearly Two-Thirds of UK Firms Say They’ll Be Ready for GDPR
NHS Gets £150m Cyber-Spending Boost
Party Like It's Password Day
Pentagon Bans Huawei and ZTE Devices from Bases
Plaintext Password Problem for Some GitHub Users
Security Holes Make Home Routers Vulnerable
Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report
Twitter Bug Stores Passwords in Plain Text
UK Firms Invest in Cybersecurity to Repel Attacks
UK Phisher Pleads Guilty to Just Eat Scam
USB in Locked PC Triggers Denial-of-Service Attack
WannaCry Dominates as Ransomware Declines in 2017
WebLogic Server Patch Needs a New Fix
Federal IT Contractors Aren’t Using An Email Security Tool That’s Now
Mandated For Agencies.
3-Year Attack On Healthcare Orgs GDPR Tips
5 Ways To Prevent A Spectre Or Meltdown Attack GDPR: It’s A Marathon, Not A Sprint