El Diario del CISO Volumen 1 2018 | Page 8

Contractor hacks former employer, destroys and corrupts data Dark Caracal: Hacking group targets Android smartphones Startup advice: hire a head of InfoSec first The ‘gig economy’ comes to your data center security – on-demand, obviously! The cost of 2017 data breaches Email security in 2018 What is Zero Trust? A model for more effective security Cyber insurance in the 2018 regulatory landscape Full disk encryption: do we need it? Who should be responsible for cybersecurity? Herding cats: lessons learned from the chaotic disclosure of the Meltdown and Spectre vulnerabilities HelpNet Security As the cloud's popularity grows, so does the risk to sensitive data CISOs are feeling less confident than ever about cyber risk and data security eBook: 5 emerging rail cybersecurity standards Global IT spending to reach $3.7 trillion in 2018 One in five healthcare pros have experienced patient data breaches Researchers uncover mobile, PC surveillance platform tied to different nation-state actors Satori variant hacks into mining rigs, steals ETH by replacing wallet address The rise of ransom hacks, and the potential impact on your business The role of trust in security: Building relationships with management and employees How digital transformation is reshaping the modern enterprise Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified Vulnerability in ISC BIND leads to DoS, patch today! Is ethical hacking more lucrative than software engineering? Week in review: WPA3, Intel AMT vulnerability, Meltdown and Spectre attack detection What has the Necurs botnet been up to? Meltdown and Spectre: To patch or to concentrate on attack detection? What is the impact and likelihood of global risks? Internet of Things security issues bleed into 2018 SecurityWeek PowerStager Tool Employs Unique Obfuscation Proposed Legislation Would Create Office of Cybersecurity at FTC Briton Pleads Guilty to Running Malware Services Researchers Earn $100,000 for Hacking Pixel Phone Canadian Man Charged Over Leak of Three Billion Hacked Accounts Risky Business (Part 2): Why You Need a Risk Treatment Plan Shared Accounts Increasingly Problematic for Critical Infrastructure: ICS- CERT Strong Incident Response Starts with Careful Preparation Device Manufacturers Working on BIOS Updates to Patch CPU Flaws Half Million Impacted by Four Malicious Chrome Extensions Triton Malware Exploited Zero-Day in Schneider Electric Devices 8