El Diario del CISO (The CISO Journal) Edición 15 | Page 11

ITProportal Teachtarget Cyber security and the growing role of red teaming Looking under the microscope at the NIS directive Major increase in identity breaches during 2017 18 Information Security Pain Points For An Organization CISO: Data integrity and confidentiality are 'pillars' of cybersecurity Force multipliers in cybersecurity: Augmenting your security workforce Securityaffairs Govinfosecurty European Central Bank announced a framework for cyber attack simulation on financial firms Reading the 2017 Internet Crime Complaint Center (IC3) report Faster Payments: Effective Fraud Mitigation Strategies NY AG Schneiderman Quits: What's Next for Enforcement? ScmagazineUK Nakedsecurity How cyber-security can embed a sustainable privacy operating model 20 years ago today! What we can learn from the CIH virus… Rampant cryptojacking harming organisations' cyber-security, experts reveal Could this be the end of password re-use? Securelist OPC UA security analysis The King is dead. Long live the King! Infoworld Cloud security: The skills gap is delaying cloud migration What your provider won’t tell you about cloud security Simple News [Infographics] Government’s Rapid Cloud Adoption Lacks Security 60 Percent of Small Businesses Fold Within 6 Months of a Cyber Attack. Here's How to Protect Yourself A Curious, New Hardware Fix for Cybersecurity Vulnerabilities A New Twist in Security Attestation A Year After the Equifax Data Breach, What If Nothing Changes? Aditya Birla Group: Over 2,000 computers at Aditya Birla Group held hostage by hackers mining cryptos Atlanta mayor says ransomware attack exposed a blind spot for the community Atrion Communications Doubles Down On Cyber With Hire Of Insurance Security Exec As First-Ever CISO Charleston-based PhishLabs raises $20.5 million, buys competing cybersecurity startup Chinese Telecom Companies in Hot Water Circadian VP Keenan Skelly: Changing the Cybersecurity Paradigm CISO View Archives - Mosaic Security Research Cloud service providers and the NIS Directive – are you resilient enough? Cryptocurrency Miners Exploit Widespread Drupal Flaw Cryptojacking spreads across the web Cryptomining with JavaScript in an Excel spreadsheet Cyber Attacks May Be Early Consequence of Trump Exiting Iran Nuclear Deal Cyber Security Tips To Combat Cyber Crime blog.netwrix.com www.inc.com www.hcanews.com www.pivotpointsecurity.com www.business2community.com economictimes.indiatimes.com statescoop.com www.crn.com www.postandcourier.com www.dataprivacyandsecurityinsider.com www.technewsworld.com mosaicsecurity.com www.itgovernance.co.uk www.inforisktoday.com theconversation.com www.grahamcluley.com securityledger.com www.ica.in