El Diario del CISO El Diario del CISO (The CISO Journal) Edición 8 | Page 10
Influencers
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Thinking and Working for a
Digital Security Leader
INFLUENCERS
7 Things everyone knows about voice in cybersecurity that you don't
(NOTE. This blog is one of a series, and if you join my IN Security Tribe you'll get access early, plus other useful content, and a welcoming,
inclusive community.
The Neuromorphic Data Microscope
Digital computers and human brains have different strengths and weaknesses. If you give me a long list of arithmetic problems to solve, at
some point I’ll slip up. “How did I get the wrong answer on that division problem? Oh yeah, I thought there was
The Red Team Operator’s Android Hacking Field Guide - Chapter 0 - Introduction
INTRODUCTIONWelcome to the Red Team Operator’s Android Hacking Field Guide -- a series dedicated to all things Android hackery.
Thinking Differently About Cybersecurity
FLIPPING CYBERSECURITY ON ITS HEAD -#3 The Threat Landscape is incredibly diverse, automated, polymorphic, and getting more difficult
to defend against every day.
A CISO looking back, “Dear younger me…”
Recently one beautiful night here in San Diego at a concert with my wife of thirty years I listened to MercyMe play a song, “Dear Younger
Me.
Humans of Cybersecurity: “The future is a boardroom with more security-aware business…
This series aims to demystify careers, challenge stereotypes, and inspire connections. Today we talk with Diana Kelley,
How to Build a Successful Cybersecurity Career | Daniel Miessler - Daniel Miessler :: information
security, technology, and humans
I’ve been doing Information Security (now called Cybersecurity by many) for around 20 years now, and I’ve spent most of that time writing
about it as well.
Intelligent CISO Issue 11
Hello and welcome to the latest edition of Intelligent CISO. We welcome Mike Webber, CISO at BlackBerry, to the cover of this month's
magazine
Multimedia Resources (Podcast and Interviews)
True Colors of Cyber Security Podcast | California
Born and Focused - cisoshare.com I'm Humbled to Tell You About My
Prestigious Award
In this episode of True Colors of Cyber Security, we’re joined by
some of the talented women in CISOSHARE. I'm not exactly sure what "humbling" means, but I'm
going to use it to hopefully soften my braggadocio
announcement.
Defense in Depth: Vulnerability
Management Exceeding Expectations - Tony Winyard
"The Value Catalyst"
So many breaches happen through ports of known vulnerabilities. Exceeding Expectations is a podcast where such people
share their stories no matter where in the world they are.
Week in security with Tony Anscombe |
WeLiveSecurity Smashing Security podcast: 'Pick of the
thief!'
An analysis by the UK's National Cyber Security Centre finds that
'123456' is by far the most-commonly re-occurring password on
breached accounts. WannaCry's "accidental hero" pleads guilty to malware
charges, Samsung and Nokia have fingerprint fumbles,
the NCSC publishes a list of 100,000 dreadful passwords
The Dangers of Unsecured Medical Devices 125: Pick of the thief!
Mitigating medical device cybersecurity risks can be a matter of life
and death, warns federal adviser and security expert Anura
Fernando, who says ensuring that WannaCry's "accidental hero" pleads guilty to malware
charges, Samsung and Nokia have fingerprint fumbles
As cybersecurity threats rise, solutions fatigue sets Cyber Security Today: FBI report, unsafe passwords, a
in for CISOs - SiliconANGLE
medical hack and how your face is being used | IT
Are chief information security officers growing tired of having to
World Canada News
manage multiple solutions and vendors to protect their businesses?
ESG Data Point of the Week: Analyst Insights