El Diario del CISO Volumen 14 | Page 5

Other Important News
CSOONLINE
Is cyberwar the fastest way to improve cybersecurity?
3 options for securing BYOD data
From buzz to the battleground, AI is everywhere
Is source code inspection a security risk? Maybe not, experts say
Streaming sites mine cryptocurrency while you watch free movies
Dear CEO, are you enabling your CISO?
4 Applied Materials executives fleece company and get indicted
Why quantum computing is a board level security risk
5 mobile security threats you should take seriously in 2018
6 resolutions for a secure new year
Researchers ' tool uncovers website breaches
A few cybersecurity predictions for 2018
Security myths: modern federation is enough
Time to close the gate on open wireless networks
How the private sector can learn from government cybersecurity guidance
Cybersecurity market slowdown? Not anytime soon
Hacking bitcoin and blockchain
3 big application security trends of 2017
Cyber attack surface grows immensely, raises security concerns
Who are you really inviting in?
Hard things are hard, security will never be easy
What’ s a known vulnerability?
How ready are you to stop an advanced attack?
5 trends from 2017 that will still matter in 2018
Mobile app trackers can lead to significant data loss
What’ s in store for security in 2018?
The SIEM is evolving
7 cyber security predictions for 2018
DarkReading
Healthcare Faces Poor Cybersecurity Prognosis
Is a Good Offense the Best Defense Against Hackers?...
Google Play Offered Fewer Blacklisted Mobile Apps in Q3
Google Sheds Light on Data Encryption Practices
8 Steps for Building an IT Security Career Path...
Former Rutgers Student, Two Others Plead Guilty to...
Automation Could Be Widening the Cybersecurity...
80 % of Americans Admit to Risky Cybersecurity Behaviors
Security Compliance: The Less You Spend the More...
Post-Breach Carnage: Worst Ways The Axe Fell in 2017
Microsoft Azure AD Connect Flaw Elevates Employee...
Lazarus Group Targets Bitcoin Company

5