El Diario del CISO Volumen 4 - 2018 | Page 7

Dark Readingg HelpNet Security CSOONLINE
Other Important News
2017 Smashed World ' s Records for Most Data ...
New POS Malware Steals Data via DNS Traffic
7 Ways to Maximize Your Security Dollars
North Korean APT Group Employed Rare Zero-Day Attack
8 Nation-State Hacking Groups to Watch in 2018
Over 12,000 Business Websites Leveraged for Cybercrime
Adobe Patches Flash Zero-Day Used in South Korean ...
Russian Authorities Arrest Engineers for ...
AutoSploit : Mass Exploitation Just Got a Lot Easier
Sacramento Bee Databases Hit with Ransomware Attack
Back to Basics : AI Isn ' t the Answer to What Ails Us ...
Security vs . Speed : The Risk of Rushing to the Cloud
BrickerBot : Internet Vigilantism Ends Don ' t Justify ...
Tennessee Hospital Hit With Cryptocurrency Mining ...
Cyber Warranties : What to Know , What to Ask
Ticking Time Bombs in Your Data Center
Google Paid $ 2.9M for Vulnerabilities in 2017
Top Cloud Security Misconceptions Plaguing ...
Identity Fraud Hits All-Time High in 2017
Two Suspects Arrested in ' Jackpotting ' Attack in ...
Man Formerly on FBI Most Wanted List Pleads Guilty ...
Uber ' s Response to 2016 Data Breach Was ' Legally ...
Mastering Security in the Zettabyte Era
Ukraine Power Distro Plans $ 20 Million Cyber ...
2017 was extraordinary : 5,200 breaches exposed 7.8 billion records
Intel releases new Spectre microcode updates for some affected processors
7 steps for getting your organization GDPR-ready
Mac crypto miner distributed via MacUpdate , other software download sites
8 trends in government tech for an enterprise-focused approach to IT
Macro-less malware : The cyclical attack
99 percent of domains are not protected by DMARC
Most remain dissatisfied with threat intelligence quality and accuracy
About the Flash zero-day currently exploited in the wild
Number of Internet-accessible ICS components is increasing every year
Android devices roped into new Monero-mining botnet
Realistic , well-positioned Reddit clone is out to grab users ' login credentials
Data and analytics maturity : Most organizations should be doing better
Server-side exploits dominate the threat landscape
Five smart TVs tested for security , privacy issues
The new gold rush : A look inside cryptocurrency fraud
Flaw in Grammarly ' s extensions opened user accounts to compromise
When crypto-mining malware hits a SCADA network
Identity fraud enters a new era of complexity
Integrated IT : The changing role of technology across organizations
11 tips for prioritizing security spending
Security metrics : telling your value story
3 leaked NSA exploits work on all Windows versions since Windows 2000
The Importance of Discerning Between Job Burnout and PTSD
3 reasons why security automation is as cool as blockchain
The life and death of a document : where did it really go ?
6 use cases for blockchain in security
The two most important ways to defend against security threats
Cyber NYC boosts the Big Apple ' s cybersecurity industry
What is access control ? 5 enforcement challenges security professionals need to know
Cybersecurity job fatigue affects many security professionals
What is cryptojacking ? How to prevent , detect , and recover from it

7