El Diario del CISO Volumen 6 | Page 4

Other Important News CSO Online Blockchain technology may not be the best solution for GDPR compliance Cyberinsurance shifts to the mainstream Digital transformation: securing customer-centric initiatives Cybersecurity is dead – long live cyber awareness Top 5 cybersecurity facts, figures and statistics for 2017 How AI can help you stay ahead of cybersecurity threats Man arrested after Facebook translates 'good morning' as 'attack them' BankInfoSecurity Clinic Pays Ransom After Backups Encrypted in Attack Fighting the Insider Threat: A Long-Term Battle Dark Reading 'BoundHook' Technique Enables Attacker Persistence ... 'Hacker Door' Backdoor Resurfaces as RAT a Decade Later What's Next After HTTPS: A Fully Encrypted Web? The Future of Democratic Threats is Digital Banks Start Broad Use of Blockchain, as JP Morgan, ... Reuters: Microsoft's 2013 Breach Hit Bug ... InfoSec Pros Among Worst Offenders of Employer Snooping New Locky Ransomware Strain Emerges What's Next after the SEC 'Insider Trading' Breach? CISOs: Striving Toward Proactive Security ... IoT Deployment Security Top Concern for Enterprises How to Talk to the C-Suite about Malware Trends SEC Says Intruders May Have Accessed Insider Data ... Help Net Security Another KRACK in the network perimeter Digital skills gap: The biggest hindrance to addressing cybersecurity? Should non-security functions get more involved in cybersecurity? The complex digital life of the modern family: Online safety and privacy concerns Can it be true? Most consumers value security more than convenience Millions download botnet-building malware from Google Play Threarpost Critical Code Execution Flaw Patched in PeopleSoft Core Engine BoundHook Attack Exploits Intel Skylake MPX Feature 4