El Diario del CISO Volumen 9 | Page 9

Cybersecurity, Regulatory Regimes, and the Intersection of Threat and Innovation - Lexology www.lexology.com Enterprises Urged to Hack Own Networks in Wake of Equifax Data Breach www.eweek.com Five Fundamental Strategies for Cybersecurity www.afcea.org Frost & Sullivan — port upgrades and terminal developments will boost port security spending www.sptnews.ca Hack The Pentagon Turns One on HackerOne www.hackerone.com How Blockchain Is Making Cybersecurity Faster and Cheaper tech.co LockCrypt Ransomware Spreading via RDP Brute-Force Attacks www.alienvault.com malware-forecast-2018.pdf www.sophos.com New chief information security officer seeks to build bridges around.uoregon.edu Powerful New Tool Against Hackers? - ValueWalk www.valuewalk.com Quantum computers could crack Bitcoin, but fixes are available now • The Register www.theregister.co.uk Risk management and measuring cyber security success www.the-gma.com Russian hackers used NYC terror attack news to lure targets into loading malware www.cyberscoop.com 5 Technology Security Tips for Businesses staysafeonline.org Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China Seven habits of CEOs to build a highly effective cyber security strategy thehackernews.com The EU General Data Protection Regulation (GDPR): What You Need to Know www.relativity.com The Psychology of Machines www.cylance.com The Role of Security Analytics in Information Security Programs digitalguardian.com Ursnif Trojan Spreading via Innovative Spear Phishing Emails blog.barkly.com When it comes to cybersecurity, health systems need a booster shot - CyberTalk.org www.cybertalk.org Why Attackers Hack Small Sites blog.sucuri.net With IoT creating significant security gaps, it’s imperative to focus on securing devices yourstory.com What’s the Dollar Amount of Your Cyber Risk? There’s Software for www.sdxcentral.com FBI: More Cyber Attacks Now Originate from Legitimate Credentials www.satellitetoday.com Severe shortage of cyber skills poses data security threat www.healthdatamanagement.com SecurityBrief NZ - Why security tools are useless if they don't relate to business objectives securitybrief.co.nz Who’s in charge of securing the internet of things? staceyoniot.com www.forbesindia.com 9