El Diario del CISO (The CISO Journal) Edición 17 | Page 11
What Is GDPR and Why Should You Care?
Malwarebytes CrackMe 2: contest summary
Careerinfosecurity
Zdnet
GDPR Compliance for US Healthcare: What You Need to Know
Google, Facebook hit with serious GDPR complaints: Others will be soon
Malware campaign expands to add cryptocurrency mining and iOS phishing
attacks
Malware Attacks: A Tale of Two Healthcare Incidents
Medical Device Cybersecurity: A Progress Report
Theregister
Securityledger
EU considers baking new norms of cyber-war into security policies
GDPRmageddon: They think it's all over! Protip, it has only just begun
Episode 97: On eve of GDPR frightening lack of data privacy, security in US
Everybody reboot! VPNFilter Malware infects 500k Routers
SCmagazineUK
Infosecinstitute
DNS flaw allows hackers to change DNS settings in 800,000 Draytek routers
Greenwich University Breach costs university £120,000
Closing the Gender Gap: Women in Cybersecurity
NIST CyberSecurity Framework
Securityintelligence
Cybersecurity Threats: 85 Percent of Security Professionals Predict a Major Attack
Department of Homeland Security's National Cybersecurity Strategy
Simple News
16-30 April 2018 Cyber Attacks Timeline
20 years on, L0pht hackers return to D.C. with dire warnings
3 Business Departments Your Cyber Security Team Should Engage Now to Improve Information Security
500,000+ Devices in 54 Countries Infected With Malware
A holistic take on cybersecurity
Analysis: Why You Need the Cybersecurity Framework
As supply chain attacks surge, people hold the key to tighter security
Become a Chief Information Security Officer (CISO)
CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman
CISO Survey Shows Importance of Threat Hunting in the Finance Sector
CISOs and GDPR: The Top 3 Concerns
CISOs not investing in insider threat defences
Communicating About Cybersecurity in Plain English
Congress Continues Push on Medical Device Cybersecurity Mandates
Cybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from
Tenable
Cybersecurity 101: Your End-Users are the First Line of Defense
www.hackmageddon.com
www.the-parallax.com
deltarisk.com
fortune.com
www.forbesindia.com
www.techwire.net
www.information-age.com
www.businessnewsdaily.com
rafeeqrehman.com
www.cisoforum.com
www.hackerone.com
www.itweb.co.za
zeltser.com
www.hklaw.com
www.iot-now.com
www.cio.com