El Diario del CISO Volumen 12 | Page 4

Other Important News HelpNetSecurity 75% of insider breaches are accidental Mainframe Security A look at the top seven ransomware attacks in the past decade No key required: How thieves use relay boxes to steal cars Are your connected devices searchable on the Internet? Not everything is sophisticated, let's keep it simple Credit card fraud down 29% for the first time OpenEMR flaw leaves millions of medical records exposed to attackers Critical macOS High Sierra bug allows easy root access Phishers target panicking PayPal users with fake "failed transaction" emails Cybersecurity concerns may stop consumers from purchasing a connected car PowerDNS patches five security holes in widely used nameserver software Data breaches hurt loyalty Ransomware's lucrative next stop? The Point of Sale Enterprise security incident response trends to watch in 2018 Stealthy in-browser cryptomining continues even after you close window Five key trends to watch in 2018 as cybercriminals continue to innovate Have you been fooled by Russian propaganda? Facebook's new tool will show you How organizations across industries create and manage policies Surge in exposed credentials puts companies at risk How secure are cryptocurrency mobile apps? Tizi backdoor rooted Android devices by exploiting old vulnerabilities Insider threats and the misuse of privileged credentials To protect your network, you must first know your network The evil of vanity metrics Three keys to making technical debt manageable UK shipbroker Clarksons refuses to pay hackers ransom for stolen data DarkReading Big Apple Flaw Allows Root Access to Macs without ... Retail and Hospitality Breaches Declined Over Past ... Cyber Forensics: The Next Frontier in Cybersecurity Sallie Mae CISO: 4 Technologies That Will Shape IT ... Deception: Why It's Not Just Another Honeypot Samsung's Mobile Device Bug Bounty Program Gets a Boost Developers Can Do More to Up Their Security Game: ... Security Geek Gift Guide First US Federal CISO Shares Security Lessons Learned Suspect in Yahoo Breach Case Pleads Guilty Git Some Security: Locking Down GitHub Hygiene The Critical Difference Between Vulnerabilities ... Hacked IV Pumps and Digital Smart Pens Can Lead to ... The Good News about Breaches: It Wasn't You this ... Lawsuits Pile Up on Uber The Looming War of Good AI vs. Bad AI New BankBot Version Avoids Detection in Google Play ... Uber's Security Slip-ups: What Went Wrong Why Security Depends on Usability -- and How to ... 4