El Diario del CISO El Diario del CISO (The CISO Journal) Edición 1 | Page 7
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
INFLUENCERS
How do I determine if an IP lookup service was used maliciously?
Recently, I helped investigate some alerts for requests to the website ipify.
For those of you who are not familiar with the service, essentially you can
make a web request to site and it spits out the public IP address of the
device
9 Reasons Cyberattacks are So Successful
In a recent whitepaper, sponsored by SlashNext, Osterman
Research conducted a survey of IT decision makers, and a few results stood
out for us:
How to become a Cybersecurity Thought Leader
****Original abbreviated article was publishedDecember 27th 2018on Forbes Magazines
Technology Council Community Voice. Thought leaders are defined as informed leaders
who are the go-to people in their field of expertise.
The Dark Overlord makes 9/11 related threats
It’s possible that I have acquired some breached data. What do you think? Does this look
like an authentic legal communication related to the September 11th Word Trade Center
attack to you?
Is it still safe to fly? Data breach hits airline booking
International travelers have every reason to be extra worried about their cybersecurity these
days. Hotel bookings are all driven by computer systems these days, and so are airline
bookings.
Magic Cyber Pills
Why autism education and Cybersecurity awareness training fails and how to solve it -
UPDATED [2018-01-14]By Eh'den Biber “If you think you’re going to solve your cybersecurity
awareness problem by technology
How to learn about cybersecurity
Many of you on Peerlyst are people who have been cybersecurity professionals for many
years. But I also occasionally see people here who have never worked in cybersecurity but
are very curious. Our field can be immensely overwhelming to newcomers.