El Diario del CISO Volumen 3 2018 | Page 8

HelpNet Security Attackers disrupt business operations through stealthy crypto mining Innovative organizations build security into their cloud strategy Authentication today: Moving beyond passwords AutoSploit: Automated mass exploitation of remote hosts using Shodan and Metasploit BEC scams surge, cybercriminals target nearly all organizations Most top US and EU e-retailers are putting their consumers at risk British cryptocurrency traders robbed of Bitcoin at gunpoint Scammers steal nearly $1 million from Bee Token ICO would-be investors Google booted 100,000 malicious developers from Google Play UK critical operators risk £17m fines for poor cybersecurity practices Groundhog Day: Third-party cyber risk edition What is a security data lake? How can we avoid another record year for breaches and ransomware? Widespread API use heightens cybersecurity risks PCI DSS 3.2 will unveil compliance cramming culture Researchers showcase automated cyber threat anticipation system How do your IT complexity challenges compare to those of other CIOs? Infosecurity-magazine Building a Cybersecurity Profession Interview: Christian Toon, CISO, Pinsent Masons Cisco: Crypto-Mining Botnets Could Make $100m Annually Just 20% of Orgs Have Breach Notification Plans Criminals Move to Cash in on Cryptocurrency Gold Rush Over 500,000 Windows Machines Infected with Monero Mining Software Critical Infrastructure More Vulnerable Than Ever Before UK Financial Firms Admit to "Shocking" Cybersecurity Practices Cybersecurity Salaries to Increase 7% in 2018 US DoJ Launches Dark Web Drugs Taskforce Fortune 500 Staff Spill 2.7 Million Log-Ins to Dark Web US Government in Whois GDPR Warning Hackers Steal Ransomware Payments from Fellow Crims Vulnerable Medical Imaging Devices Open the Door to Death Half of Orgs Hit with Ransomware in 2017 White Hat Ball Raises £191,000 for NSPCC’s Childline Service ITSecurityGuru A Beginner’s Guide to Cyber Security CISO Chat – Thom Langford, Chief Information Security Officer for Publicis Groupe Cyber League Up Our Game to the Next level Global Research Finds UK Corporate Networks are Vulnerable to Cyberattacks Because of Hidden Threats and Careless Employee Behaviour with Apps Improve collaboration to overcome cyber-attack security issues, say Proactive vs. Reactive: Which is Better for DDoS Defence? Synopsys is expanding their ‘Coverity’ tool with new languages and coding standards The Three Rs of Today’s Cybersecurity Landscape: Risk, Ransomware and Reputation With the Advent of Biometrics, Are Passwords Going Away? Zero Trust Model is essential for a tight cybersecurity system, says BOHH 8