El Diario del CISO Volumen 7 | Page 4

CSO Online How Sutton’s Law applies to cybersecurity today Trust and the blockchain: a marriage made in heaven, or a divorce waiting to happen? Kaspersky code review doesn’t solve the spying problem 6 reasons why awareness programs fail even when following best practices Measuring cyber resilience – a rising tide raises all ships Conforming to NIST’s Cybersecurity Framework to remove the new certainty of the digital age Suddenly, the CEO cares about cybersecurity How information sharing in security and intelligence can benefit your organization Legal hackback lets you go after attackers in your network What is the Cost of a Breach? Legal hackback lets you go after attackers in your network The security perimeter needs to use one of its most crucial resources: human sensors Cybersecurity artificial intelligence hype is real 3 Must-Haves for IoT Security: Learn, Segment & Protect Blockchain startup: 300,000 DDoS attacks will cause $150B in damages How to identify every type of phishing attack Secure Everything: Preparing for the Enterprise of Things Do Dangerous Gaps Exist in Your Cybersecurity Investments? No target too small, no industry untouched Dark Reading 10 Steps for Stretching Your IT Security Budget Security Training & Awareness: 3 Big Myths New Tool Debuts for Hacking Back at Hackers in Your ... US Critical Infrastructure Target of Russia-Linked ... Why Patching Software Is Hard: Technical Challenges 'Bad Rabbit' Ransomware Attacks Rock Russia, ... Bad Rabbit Dies Down But Questions Remain A Checklist for Securing the Internet of Things Dark Web Marketplaces' New Home: Mobile Messaging Apps 'Reaper' IoT Botnet Likely a DDoS-for-Hire Tool Why Data Breach Stats Get It Wrong Bad Rabbit Used Pilfered NSA Exploit 3 Steps to Reduce Risk in Your Supply Chain It's Time to Change the Cybersecurity Conversation Help Net Security Beware fake Android cryptocurrency trading apps on Google Play Infosec shouldn't eat their own, we're better than this Cybercriminals focus on the shipping and cloud storage sectors Immersive technologies are game changers for cybersecurity job growth The race to quantum supremacy and its cybersecurity impact NotPetya successor Bad Rabbit hits orgs in Russia, Ukraine 4