El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 12
U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program
Understanding the art of phishing
USB Malware Risk for 44% of Industrial Facilities
What’s the difference between a risk assessment and a business impact analysis?
Who owns application security?
Why Israel is a Leader in Cybersecurity
www.cyberdefensemagazine.com
www.itproportal.com
www.cbronline.com
www.itgovernance.co.uk
www.networksasia.net
blogs.timesofisrael.com
Multimedia Resources
Blockchain: The Good, the Bad and the Legal
www.careersinfosecurity.com
As organizations investigate public and private blockchains to secure transactions and facilitate peer-to-peer transactions
Business Email Compromise: Must-Have Defenses
www.databreachtoday.com
Want to better block business email compromise - CEO fraud - attacks outright, as well as be able to spot and respond more quickly
to any BEC attacks that get
Corin Imai, DomainTools - Paul's Security Weekly #582 - Security Weekly
securityweekly.com
Corin Imai is Sr. Security Advisor for DomainTools. Corin began her career working on desktop virtualization, networking, and cloud
computing technologies before delving into security
Episode 50: CISCO ASA 0-day and VirtualBox Vulnerability
soundcloud.com
Michael Marriott flies in from San Francisco to cover the big vulnerability and exploit stories of the week. The team discuss the Cisco
denial- of-service vulnerability affecting its Adaptive Security
Eyal Neemany, Javelin Networks - Paul's Security Weekly #582 - Security Weekly
securityweekly.com
Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks.
How Cyber Insurance Is Changing in the GDPR Era
www.bankinfosecurity.com