logoSign upLog in
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #AppSec
    Jaime Contreras, MBA, CISM, CISA
    Despite security risks, 75% of CEOs use applications that aren't approved by IT - TechRepublic
    www.techrepublic.com Despite understanding the risks, a majority of CEOs and business decision makers do not adhere to enterprise security practices, according to a new survey from...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Don't Forget Basic Security Measures, Experts Say
    www.darkreading.com Some security leaders argue there is little point in worrying about emerging threats when businesses can't defend against today's...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #BreachNews, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    5 Security Lessons WannaCry Taught Us the Hard Way
    www.darkreading.com There is a lot more our industry should be doing to protect its systems and data from cyber...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #HealthIT, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Medical Systems Hacks Are Scary, but Medical Device Hacks Could Be Even Worse
    hbr.org What if malware or ransomware gets into your...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Digital gold: why hackers love Bitcoin
    www.theguardian.com The ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Over 560 Million Passwords Discovered in Anonymous Online Database
    gizmodo.com A trove of more than 560 million login credentials has been exposed by a leaky database, researchers revealed on Tuesday, including email addresses and passwords stolen from as many as 10 popular online...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #NIST, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    NIST workshop debates new cybersecurity framework
    thehill.com
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Chrome Browser Hack Opens Door to Credential Theft
    threatpost.com Researchers at DefenseCode claim a vulnerability in Google’s Chrome browser allows hackers to steal credentials and launch SMB relay...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    The Wide-Ranging Impact of New York's Cybersecurity Regulations
    www.darkreading.com New York's toughest regulations yet are now in effect. Here's what that means for your...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Cyber Kid Stuns Experts Showing Toys Can be 'Weapons' | SecurityWeek.Com
    www.securityweek.com 11-year-old Reuben Paul stunned an audience of security experts by hacking into their bluetooth devices to manipulate a teddy bear and show how interconnected smart toys "can be...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #ThreatIntel
    Jaime Contreras, MBA, CISM, CISA
    Debunking the Deep & Dark Web: Four Myths That Can Inhibit Threat Intelligence Strategy | SecurityWeek.Com
    www.securityweek.com Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #WannaCry
    Jaime Contreras, MBA, CISM, CISA
    What to do about WannaCry if you’re infected or if you’re not
    www.networkworld.com Tips on protecting computers against WannaCry and remediating ones already...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #RiskMgt
    Jaime Contreras, MBA, CISM, CISA
    Cybercrime makes Top 10 risk list
    www.enterpriseinnovation.net New and interconnected risks pose fresh challenges to businesses in Asia Pacific, says...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #WannaCry
    Jaime Contreras, MBA, CISM, CISA
    State IT Officials Talk
    www.govtech.com
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity consciousness in the C-suite
    www.scmagazine.com With cybercriminal risk at an all-time high across the globe, it's only inevitable that ya company will be targeted, experts say. But, they add, the...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Retailer Brooks Brothers Discloses Payment Card Data Breach
    www.nytimes.com U.S. clothing company Brooks Brothers said on Friday payment card information of certain customers were compromised at some of its retail locations in the United States and Puerto Rico over 11 months until...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity Has a Serious Talent Shortage. Here’s How to Fix It
    hbr.org Look beyond the usual...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    The world's 10 biggest cybercrime hotspots in 2016, ranked
    www.businessinsider.com Cybersecurity company Symantec tracked things like hacking attacks, malware and phishing attempts to see which countries they actually came...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Legacy Systems: They Are All Fundamentally Obsolete
    www.govtech.com But obsolescence can come on several levels, so the Center for Digital Government crafted a definition to truly determine what is — and is not — a legacy...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    Hacker Steals Millions of User Account Details from Education Platform Edmodo
    motherboard.vice.com The data includes usernames, email addresses, and hashed...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #ThreatIntel
    Jaime Contreras, MBA, CISM, CISA
    RiskSecNY: No such thing as 100% automated threat intelligence, says panel
    www.scmagazine.com Automation, machine learning and artificial intelligence continue to play a growing role in detecting and diagnosing network threats based on traffic...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    6 signs enterprise security is getting better
    www.infoworld.com After decades of fumbling, companies have grown painfully aware of the risks of poor security and are finally taking best security practices and technologies...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Chrome extension trojan places victims in an endless malware loop
    www.scmagazine.com People in several Central and South American countries who want nothing more than to watch video online are being hit with a trojans that redirects the viewers to a new URL that contains malicious...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Financial services sector most attacked in 2016: IBM
    www.scmagazine.com IBM's X-Force Research Team has found that cybercriminals follow Willie Sutton's old-school, analog advice on why to rob banks...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    A database of thousands of credit cards was left exposed for months
    www.zdnet.com The data was exposed for at least six months -- likely...
    Relevant
See all