logoSign upLog in
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    www.forbes.com 2016 was a record year for data loss with reported breaches exposing almost 4.3 billion records. While the reported number of incidents has not increased year over year, the average breach was more severe – and exposed more records – than in...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    www.recordedfuture.com There’s a common misconception that threat intelligence is just about catching attacks before they happen. Here’s what’s wrong with that...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Michigan County
    www.govtech.com Livingston County, Mich., receives several thousand malware attacks per day, but its recovery plan and backup allow it to continue operating without any significant...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    IT leaders share how they quell cybersecurity attacks
    www.networkworld.com Three IT executives discuss their greatest cybersecurity fears and some of their favorite tools they use to quell...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Top 5 Dumbest Cyber Threats That Still Pay Off - Dark Reading
    www.darkreading.com Some hackers are fairly predictable in their successful use of really dumb...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #NISTCyberSec
    Jaime Contreras, MBA, CISM, CISA
    What’s in the NIST cybersecurity controls catalogue update? - Fedscoop
    www.fedscoop.com This report first appeared on CyberScoop. NIST Special Publication 800-53 isn’t the most exciting book, but for federal IT managers, the canonical catalogue of cybersecurity controls is like the English Hymnal and the Book of Common Prayer rolled...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #TechTalent
    Jaime Contreras, MBA, CISM, CISA
    Government Cyber Retraining Academy graduates snapped up by industry
    www.scmagazineuk.com Free training funded by the Government's National Cyber Security Programme produces 55 industry-ready...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    www.bankinfosecurity.com The number of debit cards compromised after the hacking of ATMs or point-of-sale devices rose by 70 percent in 2016 versus a year prior, according to FICO. What are the causes of the...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Hacker compromises nearly 100k McDonald's Canada job applications
    www.scmagazine.com The McDonald's Canada career website has suffered a data breach that compromised about 95,000 restaurant job applications, the fast-food giant acknowledged on Friday in a company...
    Relevant
  10. Fernando 🐝 Santa Isabel Llanos
    Fernando 🐝 Santa Isabel Llanos
    Microsoft Word 0day used to push dangerous Dridex malware on millions
    arstechnica.com Blast could give a boost to Dridex, one of the Internet's worst bank-fraud...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #Linux, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    How to install and use eCryptfs on Ubuntu - TechRepublic
    www.techrepublic.com If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Is Your FTP Server Waiting for a Hacker?
    www.bankinfosecurity.com The FBI recently warned that hackers are targeting FTP servers run by healthcare organizations in order to obtain medical records. New statistics show more than 750,000 FTP servers can be accessed anonymously...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity Industry Must Adopt Cyberdefense Tech that Utilizes Analytics, Artificial Intelligence
    www.govtech.com The cyberdefense industry needs to quit playing catch-up and having a reactionary approach to cybersecurity. So what is this industry doing wrong, and how can we change...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cyber security remains vital amid rising adoption of IoT in retail and customer service | Networks Asia
    www.networksasia.net As organizations look into the applications of IoT into their digital transformation strategies, such as customer experience or smart retail, it is imperative that cyber security becomes paramount in ensuring that these initiatives are built on a...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    'Can You Hear Me?' Scam Hooks Victims With a Single Word
    www.bankinfosecurity.com The FCC is warning that a scam focuses on tricking people into saying the word "yes" on the phone, which fraudsters record and later reuse as a...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cyber resilience: A new boardroom priority
    business.inquirer.net The active participation in the recent Management Association of the Philippines Forum on “Cyber Resilience: A New Boardroom Priority” shows that cyber security awareness is growing as more organizations, whether government or private, learn that...
    Relevant

    Comments

  17. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Pew Research Center: What the Public Knows About Cybersecurity | The Huffington Post
    www.huffingtonpost.com At the National Cyber Security Alliance (NCSA), we encourage everyone to learn how they can be more #CyberAware in their day-to-day lives. Online safety...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Rise of the Secure Technology Alliance
    www.careersinfosecurity.com The former Smart Card Alliance industry group has expanded its mission to include IoT, mobility and other emerging technologies. And it has a new name, too:...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #InfraGard
    Jaime Contreras, MBA, CISM, CISA
    FBI warns InfraGard members of 'malicious,' copy cat website - CyberScoop
    www.cyberscoop.com The FBI has warned members of its InfraGard program that a website is mimicking its genuine Infragard.org property, requesting login credentials for the bureau’s information sharing platform. “Please be aware www.InfraGard.com is not associated with...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #DataMgt
    Jaime Contreras, MBA, CISM, CISA
    Why companies need a data management strategy | Networks Asia
    www.networksasia.net A data management strategy is crucial for enterprises today: for digital transformation to capture new growth, and to adapt to an increasingly challenging regulatory...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Outdated software biggest cyber-breach culprit
    www.itproportal.com Better update that software,...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Texas Specialty Practice Warns 200K Patients of Ransomware Attack
    www.tripwire.com A specialty practice in Texas has notified more than 200,000 patients of a ransomware attack that might have exposed their personal...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Security check: Which apps have permission to access your online accounts?
    www.macworld.com A recent social-media hijacking reveals how poor services are about aging out unused...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #MobileSec
    Jaime Contreras, MBA, CISM, CISA
    70 percent of mobile devices of top networks vulnerable, study
    www.scmagazine.com More than 70 percent of mobile devices on five major U.S. carriers are susceptible to breach due to unpatched devices, according to a recent...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Why Cyber Audit is Must for Every Organization
    cyware.com The cyber threat landscape is changing rapidly hence in order to protect from the potential threats, companies are taking every suitable step to device a better defense plan. Internal cyber security audit is one of the strategies that organizations...
    Relevant
See all