El Diario del CISO (The CISO Journal) Edición 15 | Page 6

CSOOnline
Darkreading
Other Important News
17 Zero-Days Found & Fixed in OPC-UA Industrial ...
Microsoft ' s Patch Tuesday Fixes Two CVEs Under ...
20 Signs You Are Heading for a Retention Problem
Millennials , Women May Bridge Cyber Talent Gap
8.7B Identity Records on Surface , Deep , Dark Webs ...
Phishing Attack Bypasses Two-Factor Authentication
APT Attacks on Mobile Rapidly Emerging
Phishing Threats Move to Mobile Devices
As Personal Encryption Rises , So Do Backdoor Concerns
Proofpoint Sounds Warning on Vega Stealer Targeted ...
Author of TreasureHunter PoS Malware Releases Its ...
Properly Framing the Cost of a Data Breach
Breakout Time : A Critical Key Cyber Metric
Publicly Disclosed Breaches Down Drastically in Q1 2018
Calculating Cloud Cost : 8 Factors to Watch
Ready or Not : Transport Layer Security 1.3 Is Coming
Compliance Complexity : The ( Avoidable ) Risks of Not ...
Report : More Breaches Despite Increasing Security ...
Electroneum Cryptomining Targets Microsoft IIS 6.0 ...
Risky Business : Deconstructing Ray Ozzie ' s ...
Email Security Tools Try to Keep Up with Threats
Script Kiddies , Criminals Hacking Video Streams for ...
FBI : Reported Internet Crimes Topped $ 1.4 Billion ...
Why DDoS Just Won ' t Die
Gandcrab Ransomware Exploits Website Vulnerabilities
Trial Begins for Latvian Man Accused of Malware ...
Google Security Updates Target DevOps , Containers
US Extradites Romanian Hackers Charged with ...
‘ I ' m hacked ’ message left on dozens of Canon IoT security cameras
NSA tripled phone record surveillance , collected 534M records in 2017
2018 – the year of the targeted attack ?
Review : Keeping the bad phish out of your network pond with Cofense Triage
6 takeaways ( and 3 predictions ) from CISO meetings at the RSA Conference
Ring modernizes the neighborhood watch with its Neighbors app
Bitcoin network 3 to 10 times more ' evil ' than rest of the internet
Salted Hash Ep 28 : GDPR deadline fast approaches
CNP fraud spikes during the holiday shopping season . Here are 3 things you
can do now to protect your holiday sales
Securing IoT in Healthcare is Critical
Conway ' s Law : does your organization ’ s structure make software security
even harder ?
The evolution of security operations , automation and orchestration
Don ’ t fall off the log !
The good , the bad & the ugly of using open source code components
Georgia governor vetoes bill that would criminalize good-faith security
research , permit vigilante action
Zero Trust : Why ‘ cyber insurance ’ offers no GDPR compliance
How consumer omnichannel authentication benefits businesses
What is a Chief Security Officer ? Understanding this critical role
What is cyber resilience ? Building cybersecurity shock absorbers for the
How do you secure the cloud ? New data points a way
enterprise
2018 – the year of the targeted attack ?
Who wants to go threat hunting ?
Why enhanced authentication methods should play a bigger role in your
Is Converging Your IT and OT Networks Putting Your Organization at Risk ?
security plan