El Diario del CISO (The CISO Journal) Volumen 4 | Page 10
Volumen 4 / 2021
More than # cybernews ( Más que Cibernoticias )
Generales
Women Are Facing an Economic Crisis & the ...
4 steps to better security hygiene and posture management
4 Critical Elements of Effective Security Awareness Campaigns
Does data stolen in a data breach expire ?
Having a cybersecurity training program in place isn ' t enough to ensure cyber safety
Navigate The 2021 Privacy Landscape With This Global Privacy Map
Unearthing the ' Attackability ' of Vulnerabilities that Attract Hackers
How ransomware gangs are connected , sharing resources and tactics
7 new social engineering tactics threat actors are using now
Para el CISO y su función
“ Security leaders must communicate consistently and with transparency to build trust ”
The CISO Life Is Half as Good
Cybersecurity and the Way to a Balanced Life
The top three collaboration security misses by CISOs
How to write a cyberthreat report executives can really use
How to Attack Yourself Better in 2021
Privacy and security in the software designing ...........
Métricas de análisis de vulnerabilidad y cómo saber cuándo parchear
Shift Left : From Concept to Practice
Conceptos Humanos en Ciberseguridad
Email security is a human issue
Cybersecurity : Don ' t blame employees — make them feel like part of the solution
Help Employees Understand the Importance of Cybersecurity
Use longitudinal learning to reduce risky user behavior
Corporate boards are better at cybersecurity but still need improvement
AI Security : How Human Bias Limits Artificial Intelligence
cybersecurity : CFOs are adopting cybersecurity skills as Covid spurs digitalization
Geopolítica y Ciberseguridad
6 tips for receiving and responding to third-party security disclosures
Don ’ t discount the risk of deepfakes to the enterprise
Ciberinteligencia y geoeconomía para proteger servicios estratégicos
Hackers Are Winning the Cyber War , Largely Because They Target People
Nation-State Attacks Force a New Paradigm : Patching ...
What is Cyber Terrorism and Ways to Protect Yourself from Cyberattacks ?
New technology has enabled cyber-crime on an industrial scale
Hacktivism : Social Justice by Data Leaks and Defacements
10
El Diario del CISO (The CISO Journal) Volumen 4 | Page 9