El Diario del CISO (The CISO Journal) Volumen 4 | Page 10

Volumen 4 / 2021
More than # cybernews ( Más que Cibernoticias )
Generales Women Are Facing an Economic Crisis & the ... 4 steps to better security hygiene and posture management 4 Critical Elements of Effective Security Awareness Campaigns Does data stolen in a data breach expire ? Having a cybersecurity training program in place isn ' t enough to ensure cyber safety Navigate The 2021 Privacy Landscape With This Global Privacy Map Unearthing the ' Attackability ' of Vulnerabilities that Attract Hackers How ransomware gangs are connected , sharing resources and tactics 7 new social engineering tactics threat actors are using now
Para el CISO y su función “ Security leaders must communicate consistently and with transparency to build trust ” The CISO Life Is Half as Good Cybersecurity and the Way to a Balanced Life The top three collaboration security misses by CISOs How to write a cyberthreat report executives can really use How to Attack Yourself Better in 2021 Privacy and security in the software designing ........... Métricas de análisis de vulnerabilidad y cómo saber cuándo parchear Shift Left : From Concept to Practice
Conceptos Humanos en Ciberseguridad Email security is a human issue Cybersecurity : Don ' t blame employees — make them feel like part of the solution Help Employees Understand the Importance of Cybersecurity Use longitudinal learning to reduce risky user behavior Corporate boards are better at cybersecurity but still need improvement AI Security : How Human Bias Limits Artificial Intelligence cybersecurity : CFOs are adopting cybersecurity skills as Covid spurs digitalization
Geopolítica y Ciberseguridad 6 tips for receiving and responding to third-party security disclosures Don ’ t discount the risk of deepfakes to the enterprise Ciberinteligencia y geoeconomía para proteger servicios estratégicos Hackers Are Winning the Cyber War , Largely Because They Target People Nation-State Attacks Force a New Paradigm : Patching ... What is Cyber Terrorism and Ways to Protect Yourself from Cyberattacks ? New technology has enabled cyber-crime on an industrial scale Hacktivism : Social Justice by Data Leaks and Defacements
10