El Diario del CISO (The CISO Journal) Edición 11 2018 | Page 4

users into believing not only that a website is associated with someone else but also that the website is secure when it is not. Influencers Wayne Schepens Managing Director at LaunchTech Communications A crack in Under Armour Within Security Operations Centers (SOCs), and throughout IT security departments, people and tools rule supreme. Cybersecurity management within most organizations is dictated by spending on human resources and technology, with little to no emphasis on Return on Investment (ROI) analysis, and little to no proof-of-value analysis on the myriad of security products in use. As a result, much confusion within the cybersecurity industry exists concerning the true effectiveness and Total Overall Cost (TOC) concerning security tools. Customers making use of cybersecurity products tend to ask ambiguous, irrelevant questions like, “How long has it been since we’ve had a successful breach?” Unfortunately, this question is not fruitful. Breaches are inevitable, and this thinking is not proactive. Answering this question will not mitigate future risks, which is all that counts. Leaders are scratching their heads wondering what works, what does not work, and how to strengthen their cybersecurity posture for future. The complete article is here Doug Isenberg Internet Law Attorney (The GigaLaw Firm); Marketing Entrepreneur How Cybersquatters Use 'https' to Confuse Internet Users Cybersquatters may be adding a new trick to their repertoire: including the characters "https" in a domain name to confuse Internet As Wikipedia notes, "https" is "an adaptation of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network" and is used for the "protection of the privacy and integrity of the exchanged data." The complete article is here