logoSign upLog in
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    The Best of RSA Conference 2017
    www.bankinfosecurity.com Our objective, as the industry’s largest global media organization, is to bring you the most important bits from the conference, whether you attended the event...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #RSA, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    fortune.com Beneath the RSA fun lurked the question of when this money merry-go-round will stop, and which cyber winners and losers will...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #HCISPP
    Jaime Contreras, MBA, CISM, CISA
    Healthcare IT Certifications 2017: HCISPP, CAHIMS, CISSP, and CompTIA
    learnhealthtech.com Healthcare IT certifications 2017. HCISPP, CAHIMS, CISSP, and CompTIA Healthcare IT Technician certs to help you jump start your technology career in...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    RSA 2017: Voices of InfoSec Thought Leaders
    www.bankinfosecurity.com This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #HIPAA, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    GAO: EHRs, health insurance marketplaces among federal cybersecurity weaknesses | FierceHealthcare
    www.fiercehealthcare.com The Government Accountability Office once again called on the federal government to strengthen its cybersecurity capabilities across several platforms, with particular emphasis on hospital medical records and state-based insurance marketplaces. The...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Cybersecurity Lessons From Kung Fu | SecurityWeek.Com
    www.securityweek.com Dodging an attack means that we prevent an attack from impacting our infrastructure. If the exploit coming at you cannot execute, it cannot cause damage or establish a...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #IoT, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    How IoT hackers turned a university's network against itself | ZDNet
    www.zdnet.com A university found its own network turned against it - as refrigerators and lights overwhelmed it with searches for...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #Malware, #IoT
    Jaime Contreras, MBA, CISM, CISA
    University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices
    www.networkworld.com The university's hijacked vending machines and 5,000 other IoT devices were making seafood-related DNS requests every 15...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    DynA-Crypt Ransomware Steals and Deletes User Data
    www.infosecisland.com DynA-Crypt Ransomware Steals and Deletes User Data A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Security experts share 3 key insights on ransomware | Networks Asia
    www.networksasia.net Before people entangle themselves in everything digital that this year has to offer, it's important to heed expert...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Cybercriminals Use Hidden Malware to Access Financial Processes of Enterprises | CFO innovation
    www.cfoinnovation.com Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software to access to financial processes of...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #Phishing
    Jaime Contreras, MBA, CISM, CISA
    IRS: New Email Phishing Combines W-2 Theft, Wire Fraud
    www.bankinfosecurity.com Companies have lost thousands of dollars in email compromise attacks that first steal W-2s and then attempt wire transfer frauds, the IRS warns, labeling...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    FBI: Cybercrime Gang Stole $1.2 Million via Bank Malware
    www.bankinfosecurity.com The FBI says it's continuing to investigate an international cybercrime ring that stole at least $1.2 million via malware, money mules and overseas bank...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    1.9 million Michigan government workers PII compromised
    www.scmagazine.com Almost 1.89 million Michigan residents had their names and Social Security numbers potentially exposed due to when a software update went awry opening the information to...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Attention to cyber-security is becoming daily routine in the C-suite
    www.scmagazine.com While far-reaching and diverse, the underlying causes of security risks are amenable to collective...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #Healthcare, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    AAMI: Cybersecurity standards help manage IT risks | FierceHealthcare
    www.fiercehealthcare.com As healthcare organizations face a growing number of cybersecurity risks—both in quantity and severity—executives need to rely on established standards that will mitigate potential safety concerns and protect against data loss. A report from AAMI...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    New malware stealing login data, bitcoin from cryptocurrency wallets
    www.hackread.com Cyren, an Internet security firm, has discovered a new malware that can steal bitcoin and passwords from cryptocurrency wallets on computers. The company...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Fake Chrome Font Update Attack Distributes Ransomware | SecurityWeek.Com
    www.securityweek.com A malware campaign targeting Chrome users with fake font update notifications is now distributing ransomware instead of ad fraud...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    PlayStation and Xbox forum hack exposes credentials of 2.5 million gamers | TheINQUIRER
    www.theinquirer.net Passwords and IP addresses compromised in ISO forum breach,Security ,Hacking,Security,cloud...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Federal agencies leasing in foreign owned buildings may cause cyberespionage risks
    www.scmagazine.com The report found at least 25 different offices used by the agencies including FBI, Department of Justice, State Department, and...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Ransomware is about to get a lot worse, by holding your operating system hostage | ZDNet
    www.zdnet.com Researchers warn how ransomware could do more than just encrypt your...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Linux devices with standard settings infected by Linux.Proxy.10 malware
    www.hackread.com Linux operating system was once known to be the most secure OS in the world, but things have changed since security researchers have found malware like...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #InfoSec, #RiskMgt
    Jaime Contreras, MBA, CISM, CISA
    Why You're Doing Cybersecurity Risk Measurement Wrong
    www.darkreading.com Measuring risk isn't as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #Ransomware, #CyberSec
    Cyber Crime Waves
    www.disaster-resource.com Joomla! - the dynamic portal engine and content management...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #HITRUST
    Jaime Contreras, MBA, CISM, CISA
    HITRUST Advances Healthcare Industry Cyber Risk Management with Creation of Threat Catalogue - HITRUST
    hitrustalliance.net Threat Catalogue aligns threats to HITRUST CSF Controls to improve effectiveness of organizational risk analyses February 1, 2017 – Frisco, TX: HITRUST announced today the creation of a Threat Catalogue to aid healthcare organizations in improving...
    Relevant
See all