El Diario del CISO (The CISO Journal) Edición 15 | Page 6

CSOOnline
Darkreading
Other Important News
17 Zero-Days Found & Fixed in OPC-UA Industrial...
Microsoft ' s Patch Tuesday Fixes Two CVEs Under...
20 Signs You Are Heading for a Retention Problem
Millennials, Women May Bridge Cyber Talent Gap
8.7B Identity Records on Surface, Deep, Dark Webs...
Phishing Attack Bypasses Two-Factor Authentication
APT Attacks on Mobile Rapidly Emerging
Phishing Threats Move to Mobile Devices
As Personal Encryption Rises, So Do Backdoor Concerns
Proofpoint Sounds Warning on Vega Stealer Targeted...
Author of TreasureHunter PoS Malware Releases Its...
Properly Framing the Cost of a Data Breach
Breakout Time: A Critical Key Cyber Metric
Publicly Disclosed Breaches Down Drastically in Q1 2018
Calculating Cloud Cost: 8 Factors to Watch
Ready or Not: Transport Layer Security 1.3 Is Coming
Compliance Complexity: The( Avoidable) Risks of Not...
Report: More Breaches Despite Increasing Security...
Electroneum Cryptomining Targets Microsoft IIS 6.0...
Risky Business: Deconstructing Ray Ozzie ' s...
Email Security Tools Try to Keep Up with Threats
Script Kiddies, Criminals Hacking Video Streams for...
FBI: Reported Internet Crimes Topped $ 1.4 Billion...
Why DDoS Just Won ' t Die
Gandcrab Ransomware Exploits Website Vulnerabilities
Trial Begins for Latvian Man Accused of Malware...
Google Security Updates Target DevOps, Containers
US Extradites Romanian Hackers Charged with...
‘ I ' m hacked’ message left on dozens of Canon IoT security cameras
NSA tripled phone record surveillance, collected 534M records in 2017
2018 – the year of the targeted attack?
Review: Keeping the bad phish out of your network pond with Cofense Triage
6 takeaways( and 3 predictions) from CISO meetings at the RSA Conference
Ring modernizes the neighborhood watch with its Neighbors app
Bitcoin network 3 to 10 times more ' evil ' than rest of the internet
Salted Hash Ep 28: GDPR deadline fast approaches
CNP fraud spikes during the holiday shopping season. Here are 3 things you
can do now to protect your holiday sales
Securing IoT in Healthcare is Critical
Conway ' s Law: does your organization’ s structure make software security
even harder?
The evolution of security operations, automation and orchestration
Don’ t fall off the log!
The good, the bad & the ugly of using open source code components
Georgia governor vetoes bill that would criminalize good-faith security
research, permit vigilante action
Zero Trust: Why‘ cyber insurance’ offers no GDPR compliance
How consumer omnichannel authentication benefits businesses
What is a Chief Security Officer? Understanding this critical role
What is cyber resilience? Building cybersecurity shock absorbers for the
How do you secure the cloud? New data points a way
enterprise
2018 – the year of the targeted attack?
Who wants to go threat hunting?
Why enhanced authentication methods should play a bigger role in your
Is Converging Your IT and OT Networks Putting Your Organization at Risk?
security plan