El Diario del CISO (The CISO Journal) Edición 16 | Page 8

7 highest-paying IT security jobs, 2018 RSA 2018 conference recap Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach Scamming the scammers Facial recognition tech used by UK cops is 'dangerously inaccurate' Short on security analysts? AI can help Fact vs. fiction: 6 myths about container security Fighting fraud: Tips for getting ahead of the ever-evolving threat Hacks turn Amazon Alexa and Google Home into secret eavesdroppers Honeypots as deception solutions: What to look for and how to buy How privacy is moving data security to the top of corporate agendas Inside an Apple phishing attack Let’s get serious about security: 2.6 billion records stolen or compromised in 2017 The GDPR is a journey, not a destination Theft of North Korean secrets may have pushed Kim Jong Un into talks More Apps and Devices in More Places: How Will You Ever Manage? What is Telegram and is it secure? What should a cyber-resilient business look like? White House axes cyber czar role; DHS unveils cybersecurity strategy Achieving Continuous Compliance In The Cloud Will WebAuthn replace passwords or not? Most businesses believe stronger data protection policies will lead to fewer breaches Most firms struggle to comply with GDPR deadline Personal encryption usage is increasing Phishers increasingly targeting cloud storage and SaaS Protecting your business behind a shield of privacy Relying on legacy security technologies leaves you blind to IoT threats Rising concerns about managing risk and proving compliance in the medical device industry Sometimes employees follow cybersecurity best practices beyond company policies The pace of vulnerability disclosure shows no signs of slowing Internet of Things: Who is watching you? White House eliminates Cybersecurity Coordinator role Infoblox Research Finds Explosion Of Personal And IoT Devices On Enterprise Networks Introduces Immense Security Risk Advanced Detection Techniques For Brand Forgery Iran's Hacker Hierarchy Exposed Cyber Attack News - Mexican Banks Hacked Cryptomining Malware Targeting Unpatched Server Vulnerabilities, Says Check Point Is The C-Suite Exempt From Cyber-Crime Anxiety? How Encrypting Data Can Protect Sensitive Company Data The AWS Bucket List For Security 25% of companies affected by cloud cryptojacking Are security pros happy with their jobs and salaries? Automating web app testing to secure your environment Careless researchers expose millions of Facebook users' sensitive data Companies ditch data as GDPR deadline approaches Europe continues to be a cybercrime hub Exposing the threat of shadow devices Hackers can jump from passenger Wi-Fi to train control networks How consumers are embracing IoT IBM employees banned from using portable storage devices Insider threat blind spot enables employee revenge attacks Step Aside Ransomware…Cryptojacking Is The New Kid On The Block!