El Diario del CISO (The CISO Journal) Edición 8 2018 | Page 7

'Slingshot' Cyber Espionage Campaign Hacks Network ... 6 Questions to Ask Your Cloud Provider Right Now 7 University-Connected Cyber Ranges to Know Now CERT.org Goes Away, Panic Ensues CIGslip Lets Attackers Bypass Microsoft Code ... Connected Cars Pose New Security Challenges Cybersecurity Gets Added to the M&A Lexicon Design Weakness in Microsoft CFG Allows Complete ... DevSecOps: The Importance of Building Security from ... Group-IB Helps Suspend Ukrainian DDoS Attack Group Hacking Back & the Digital Wild West How Guccifer 2.0 Got 'Punk'd' by a Security Researcher Gozi Trojan Using Dark Cloud Botnet in New Wave of Attacks 3 Must-Haves for Hybrid Cloud Security Best Buy's Geek Squad and the FBI have been in bed together for years Corporate boards will face the spotlight in cybersecurity incidents FBI chief calls for public-private detente on encryption Has responsible disclosure won the debate? Homeland Security's IT security continues to fall short How benchmarking can make your job much less stressful How managers can best communicate the importance of cybersecurity to employees How to prepare for the next cybersecurity attack Inside RSA's state-of-the-art fraud intelligence command center Is your defensive security data-driven? Android P: Expected security and privacy improvements Backdooring connected cars for covert remote control Cisco fixes critical flaw in its Secure Access Control System Cloud access management is integral to adopting cloud applications Olympic Destroyer's 'False Flag' Changes the Game China's Vulnerability Database Altered to Hide Govt. Influence Insider Threat Seriously Undermining Healthcare ... Memcached DDoS Attack: Kill Switch, New Details ... More Security Vendors Putting