El Diario del CISO El Diario del CISO (The CISO Journal) Edición 8 | Page 10

Influencers EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader INFLUENCERS 7 Things everyone knows about voice in cybersecurity that you don't (NOTE. This blog is one of a series, and if you join my IN Security Tribe you'll get access early, plus other useful content, and a welcoming, inclusive community. The Neuromorphic Data Microscope Digital computers and human brains have different strengths and weaknesses. If you give me a long list of arithmetic problems to solve, at some point I’ll slip up. “How did I get the wrong answer on that division problem? Oh yeah, I thought there was The Red Team Operator’s Android Hacking Field Guide - Chapter 0 - Introduction INTRODUCTIONWelcome to the Red Team Operator’s Android Hacking Field Guide -- a series dedicated to all things Android hackery. Thinking Differently About Cybersecurity FLIPPING CYBERSECURITY ON ITS HEAD -#3 The Threat Landscape is incredibly diverse, automated, polymorphic, and getting more difficult to defend against every day. A CISO looking back, “Dear younger me…” Recently one beautiful night here in San Diego at a concert with my wife of thirty years I listened to MercyMe play a song, “Dear Younger Me. Humans of Cybersecurity: “The future is a boardroom with more security-aware business… This series aims to demystify careers, challenge stereotypes, and inspire connections. Today we talk with Diana Kelley, How to Build a Successful Cybersecurity Career | Daniel Miessler - Daniel Miessler :: information security, technology, and humans I’ve been doing Information Security (now called Cybersecurity by many) for around 20 years now, and I’ve spent most of that time writing about it as well. Intelligent CISO Issue 11 Hello and welcome to the latest edition of Intelligent CISO. We welcome Mike Webber, CISO at BlackBerry, to the cover of this month's magazine Multimedia Resources (Podcast and Interviews) True Colors of Cyber Security Podcast | California Born and Focused - cisoshare.com I'm Humbled to Tell You About My Prestigious Award In this episode of True Colors of Cyber Security, we’re joined by some of the talented women in CISOSHARE. I'm not exactly sure what "humbling" means, but I'm going to use it to hopefully soften my braggadocio announcement. Defense in Depth: Vulnerability Management Exceeding Expectations - Tony Winyard "The Value Catalyst" So many breaches happen through ports of known vulnerabilities. Exceeding Expectations is a podcast where such people share their stories no matter where in the world they are. Week in security with Tony Anscombe | WeLiveSecurity Smashing Security podcast: 'Pick of the thief!' An analysis by the UK's National Cyber Security Centre finds that '123456' is by far the most-commonly re-occurring password on breached accounts. WannaCry's "accidental hero" pleads guilty to malware charges, Samsung and Nokia have fingerprint fumbles, the NCSC publishes a list of 100,000 dreadful passwords The Dangers of Unsecured Medical Devices 125: Pick of the thief! Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that WannaCry's "accidental hero" pleads guilty to malware charges, Samsung and Nokia have fingerprint fumbles As cybersecurity threats rise, solutions fatigue sets Cyber Security Today: FBI report, unsafe passwords, a in for CISOs - SiliconANGLE medical hack and how your face is being used | IT Are chief information security officers growing tired of having to World Canada News manage multiple solutions and vendors to protect their businesses? ESG Data Point of the Week: Analyst Insights