El Diario del CISO Volumen 4 - 2018 | Page 7

Dark Readingg HelpNet Security CSOONLINE
Other Important News
2017 Smashed World ' s Records for Most Data...
New POS Malware Steals Data via DNS Traffic
7 Ways to Maximize Your Security Dollars
North Korean APT Group Employed Rare Zero-Day Attack
8 Nation-State Hacking Groups to Watch in 2018
Over 12,000 Business Websites Leveraged for Cybercrime
Adobe Patches Flash Zero-Day Used in South Korean...
Russian Authorities Arrest Engineers for...
AutoSploit: Mass Exploitation Just Got a Lot Easier
Sacramento Bee Databases Hit with Ransomware Attack
Back to Basics: AI Isn ' t the Answer to What Ails Us...
Security vs. Speed: The Risk of Rushing to the Cloud
BrickerBot: Internet Vigilantism Ends Don ' t Justify...
Tennessee Hospital Hit With Cryptocurrency Mining...
Cyber Warranties: What to Know, What to Ask
Ticking Time Bombs in Your Data Center
Google Paid $ 2.9M for Vulnerabilities in 2017
Top Cloud Security Misconceptions Plaguing...
Identity Fraud Hits All-Time High in 2017
Two Suspects Arrested in ' Jackpotting ' Attack in...
Man Formerly on FBI Most Wanted List Pleads Guilty...
Uber ' s Response to 2016 Data Breach Was ' Legally...
Mastering Security in the Zettabyte Era
Ukraine Power Distro Plans $ 20 Million Cyber...
2017 was extraordinary: 5,200 breaches exposed 7.8 billion records
Intel releases new Spectre microcode updates for some affected processors
7 steps for getting your organization GDPR-ready
Mac crypto miner distributed via MacUpdate, other software download sites
8 trends in government tech for an enterprise-focused approach to IT
Macro-less malware: The cyclical attack
99 percent of domains are not protected by DMARC
Most remain dissatisfied with threat intelligence quality and accuracy
About the Flash zero-day currently exploited in the wild
Number of Internet-accessible ICS components is increasing every year
Android devices roped into new Monero-mining botnet
Realistic, well-positioned Reddit clone is out to grab users ' login credentials
Data and analytics maturity: Most organizations should be doing better
Server-side exploits dominate the threat landscape
Five smart TVs tested for security, privacy issues
The new gold rush: A look inside cryptocurrency fraud
Flaw in Grammarly ' s extensions opened user accounts to compromise
When crypto-mining malware hits a SCADA network
Identity fraud enters a new era of complexity
Integrated IT: The changing role of technology across organizations
11 tips for prioritizing security spending
Security metrics: telling your value story
3 leaked NSA exploits work on all Windows versions since Windows 2000
The Importance of Discerning Between Job Burnout and PTSD
3 reasons why security automation is as cool as blockchain
The life and death of a document: where did it really go?
6 use cases for blockchain in security
The two most important ways to defend against security threats
Cyber NYC boosts the Big Apple ' s cybersecurity industry
What is access control? 5 enforcement challenges security professionals need to know
Cybersecurity job fatigue affects many security professionals
What is cryptojacking? How to prevent, detect, and recover from it

7