El Diario del CISO Volumen 3 2018 | Page 7

Other Important News DarkReading 'Ransomware' Added to Oxford English Dictionary DNS Hijacking: The Silent Threat That's Putting ... 3 Ways Hackers Steal Your Company's Mobile Data Hack Costs Coincheck Cryptocurrency Exchange $530 ... 5 Questions to Ask about Machine Learning IoT Botnets by the Numbers 700,000 Bad Apps Deleted from Google Play in 2017 Lazarus Group, Fancy Bear Most Active Threat Groups ... Adobe to Patch Flash Zero-Day Discovered in South ... Microsoft Issues Emergency Patch to Disable Intel's ... An Action Plan to Fill the Information Security ... Phishing Campaign Underscores Threat from Low ... APIs Pose 'Mushrooming' Security Risk Poor Visibility, Weak Passwords Compromise Active ... Breach-Proofing Your Data in a GDPR World Russian National Arrested for Kelihos Botnet Sent to US Crypto-Mining Attacks Emerge as the New Big Threat ... Strava Fitness App Shares Secret Army Base Locations Cyberattack Impersonates FBI Internet Crime ... Thieves Target ATMs In First US 'Jackpotting' Attacks Data Encryption: 4 Common Pitfalls Thinking about a Career Move in Cybersecurity? CSOONLINE 3 ways to make the most of GDPR Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics? Microsoft releases Windows patch to disable Intel's buggy Spectre fix 4 things CISOs should stress to the board of directors about cloud security New cryptocurrencies offer better anonymity, new security challenges Basics for soaring above security challenges Poll: Dissolving network boundary requires a new approach to security. Bridging the smart cities security divide Strategic security Buggy Malwarebytes protection update wreaks havoc for users Enterprise plans for security automation and orchestration The biggest threat to building organizational cyber awareness Top Cybersecurity Threats Active in the Education Sector Today – and Why You Should Care Understanding Gartner, and its limitations GDPR keeping you up? There’s another monster hiding under the bed… Using better data to fight credit card fraud Healthcare cybersecurity spending to exceed $65B over the next 5 years Whose data is it anyway? 10 old-school security principles that (still) rule Dynamic authorization: a solution to navigating GDPR 7