El Diario del CISO El Diario del CISO (The CISO Journal) Edición 13 | Page 10
influencers
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
A Conflict of Interest? | Fluid Attacks
INFLUENCERS
Casting the Dark Web in a New Light -
sloanreview.mit.edu
CISO Manifesto: Rules we wish vendors
would follow Congratulations! Your device was infected with
malware before you bought it
Council Post: Observations From A Free
Agent CISO Cybersecurity Careers: Hacking Your Next Job
Cybersecurity Recruiters: Your Failures
Explained Do cybersecurity professionals let their phones
track them?
Explainer: What is post-quantum
cryptography? FaceApp or Face Off…
How to Perform Static Malware Analysis with
Radare2 How to start looking for an Infosec job - my list
of tips
Innovation more understandable | Fluid
Attacks It's Time We Changed The Way We Manage
Cybersecurity
Learn Linux – First step to be a better
Infosec Professional Sensible about cybersecurity | Fluid Attacks
Highlights the Critical Role of Business and
Government Leaders Working Together to
Fight Global Cybercrime How China Will
Superiority by 2025
Achieve
Global
Cyber
Multimedia Resources (Recursos Multimediales)
2.3 Billion Files Exposed Online: The Root
Causes CISO Notebook: Third-Party Risk
Defense in Depth: CISO Series Cyber Harassment
CISO Series One Year Review Enterprise Security Weekly #146
WEforum – Paul’s Security Weekly #613 Hack Naked News #228
Creating Resilient Business Applications Enterprise Security Weekly #146
Medical Device Security: The CISO's View Enterprise Security Weekly #146
Passwords So Good You Can't Help But Reuse
Them CISO Series Please Don't Investigate Our Impeccable Risk
Predictions CISO Series
Securing Identity With Conditional Access
The Business Case Behind Continuous
Monitoring
The Good, the Bad and the Ugly in
Cybersecurity - Week 30 The Nexus of Organized Cyber Crime and
Cyber Terrorism
Troy Hunt: Weekly Update 149 Week in security with Tony Anscombe
Will Cyberattacks Lead to Prolonged Conflicts? Who Are the Perfect Targets for
Ransomware?
ESG Data Point of the Week ESG Data Point of the Week