El Diario del CISO (The CISO Journal) Edición 16 | Page 8
7 highest-paying IT security jobs, 2018 RSA 2018 conference recap
Cloud Security Alerts: Automation Can Fill Gaps in Multi Cloud Approach Scamming the scammers
Facial recognition tech used by UK cops is 'dangerously inaccurate' Short on security analysts? AI can help
Fact vs. fiction: 6 myths about container security
Fighting fraud: Tips for getting ahead of the ever-evolving threat
Hacks turn Amazon Alexa and Google Home into secret eavesdroppers
Honeypots as deception solutions: What to look for and how to buy
How privacy is moving data security to the top of corporate agendas
Inside an Apple phishing attack
Let’s get serious about security: 2.6 billion records stolen or compromised in
2017 The GDPR is a journey, not a destination
Theft of North Korean secrets may have pushed Kim Jong Un into talks
More Apps and Devices in More Places: How Will You Ever Manage?
What is Telegram and is it secure?
What should a cyber-resilient business look like?
White House axes cyber czar role; DHS unveils cybersecurity strategy
Achieving Continuous Compliance In The Cloud Will WebAuthn replace passwords or not?
Most businesses believe stronger data protection policies will lead to fewer
breaches
Most firms struggle to comply with GDPR deadline
Personal encryption usage is increasing
Phishers increasingly targeting cloud storage and SaaS
Protecting your business behind a shield of privacy
Relying on legacy security technologies leaves you blind to IoT threats
Rising concerns about managing risk and proving compliance in the medical
device industry
Sometimes employees follow cybersecurity best practices beyond company
policies
The pace of vulnerability disclosure shows no signs of slowing
Internet of Things: Who is watching you?
White House eliminates Cybersecurity Coordinator role
Infoblox Research Finds Explosion Of Personal And IoT Devices On Enterprise
Networks Introduces Immense Security Risk
Advanced Detection Techniques For Brand Forgery Iran's Hacker Hierarchy Exposed
Cyber Attack News - Mexican Banks Hacked
Cryptomining Malware Targeting Unpatched Server Vulnerabilities, Says
Check Point Is The C-Suite Exempt From Cyber-Crime Anxiety?
How Encrypting Data Can Protect Sensitive Company Data The AWS Bucket List For Security
25% of companies affected by cloud cryptojacking
Are security pros happy with their jobs and salaries?
Automating web app testing to secure your environment
Careless researchers expose millions of Facebook users' sensitive data
Companies ditch data as GDPR deadline approaches
Europe continues to be a cybercrime hub
Exposing the threat of shadow devices
Hackers can jump from passenger Wi-Fi to train control networks
How consumers are embracing IoT
IBM employees banned from using portable storage devices
Insider threat blind spot enables employee revenge attacks
Step Aside Ransomware…Cryptojacking Is The New Kid On The Block!