El Diario del CISO (The CISO Journal) Edición 8 2018 | Page 7
'Slingshot' Cyber Espionage Campaign Hacks Network ...
6 Questions to Ask Your Cloud Provider Right Now
7 University-Connected Cyber Ranges to Know Now
CERT.org Goes Away, Panic Ensues
CIGslip Lets Attackers Bypass Microsoft Code ...
Connected Cars Pose New Security Challenges
Cybersecurity Gets Added to the M&A Lexicon
Design Weakness in Microsoft CFG Allows Complete ...
DevSecOps: The Importance of Building Security from ...
Group-IB Helps Suspend Ukrainian DDoS Attack Group
Hacking Back & the Digital Wild West
How Guccifer 2.0 Got 'Punk'd' by a Security Researcher
Gozi Trojan Using Dark Cloud Botnet in New Wave of Attacks
3 Must-Haves for Hybrid Cloud Security
Best Buy's Geek Squad and the FBI have been in bed together for years
Corporate boards will face the spotlight in cybersecurity incidents
FBI chief calls for public-private detente on encryption
Has responsible disclosure won the debate?
Homeland Security's IT security continues to fall short
How benchmarking can make your job much less stressful
How managers can best communicate the importance of cybersecurity to
employees
How to prepare for the next cybersecurity attack
Inside RSA's state-of-the-art fraud intelligence command center
Is your defensive security data-driven?
Android P: Expected security and privacy improvements
Backdooring connected cars for covert remote control
Cisco fixes critical flaw in its Secure Access Control System
Cloud access management is integral to adopting cloud applications
Olympic Destroyer's 'False Flag' Changes the Game
China's Vulnerability Database Altered to Hide Govt. Influence
Insider Threat Seriously Undermining Healthcare ...
Memcached DDoS Attack: Kill Switch, New Details ...
More Security Vendors Putting