El Diario del CISO El Diario del CISO (The CISO Journal) Edición 22 | Page 13

Hamas Cyber Ops Spied on Hundreds of Israeli Soldiers Using Fake World Cup, Dating Apps HHS Weighs Changes to Health Data Privacy Regulations Homeland Security Cybersecurity Command Aims to Thwart Cyberattacks How cybersecurity changed in the last decade; how will it change in the next How to improve cybersecurity in a connected world HSTRisk: Define, Measure Risk Well to Avoid False Sense of Security IEC blog » Securing the critical supply chain If we fight cyberattacks alone, we’re doomed to fail Information Technology Is Corporate Culture Important for Cybersecurity? IT Security News Blast 07-30-2018 j en Twitter: "@itinsecure - Infografía * ¿Cómo reducir la superficie de un ataque? - Comparte con tus colegas! #CiberLideraXgo… " Knowledge Corner Spotlight - 31269 :: SEC: Strategic Security Advisory Services for CSOs List of data breaches and cyber attacks in July 2018 – 139,731,894 million records leaked Malcolm Harkins: "Impossible is Not a Declaration. It's a Dare." McAfee's 'Unhackable' Bitcoin Wallet Allegedly Hacked Measuring Success in Cybersecurity Multi-vector ransomware attack shuts down Alaskan suburbs Preventing the Next Digital Black Swan: The Auditor, The CISO and The C-Suite Reddit breach leaves personal data of some users exposed Risk Management – A Crash Course in Data Breach Readiness Russian Hackers Successfully Phished Hundreds of U.S. Companies Last Year SamSam ransomware can shut your city down Social engineering attacks: What makes you susceptible? Spam still a popular choice for online criminals Stronger Cyber Defense for Power Plants is needed The Evolving Role of the CISO: From Risk Manager to Business Enabler The Poor Cybersecurity of US Space Assets The Risks of a Global Digital Workplace The Secret’s Out: Reports of the privacy of private browsing have been greatly exaggerated Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy To Fill Desperately-Needed Cybersecurity Jobs, North Dakota State University Brings in the Youth www.countdown2040.com www.careersinfosecurity.com www.digitaltrends.com triblive.com news.itu.int www.hstoday.us blog.iec.ch www.theguardian.com www.controlglobal.com www.bricata.com criticalinformatics.com twitter.com www.securityexecutivecouncil.com www.itgovernance.co.uk threatvector.cylance.com cryptonewmedia.press www.lawjournalnewsletters.com hotforsecurity.bitdefender.com philipcao.com www.welivesecurity.com www.rmmagazine.com www.dataprivacyandsecurityinsider.com blog.avast.com blog.malwarebytes.com www.itproportal.com cyberstartupobservatory.com www.securityroundtable.org www.schneier.com www.recordedfuture.com blog.avast.com blog.thalesesecurity.com www.govtech.com