El Diario del CISO Volumen 8 | Page 4

Other Important News CSO Online Getting rid of social security numbers is not the answer More data records were lost or stolen in the first half of 2017 than all of 2016 The Future of Cybersecurity Part I: The Problem of Complexity The missing link in IT collaboration Be afraid of the dark web – or learn to monitor it Why small and mid-sized businesses are a huge target for cyber attacks 3 ways to avoid Slack attacks Where Emerging Cybersecurity Technology Fits in Your Business Unencrypted USB stick with 2.5GB of data detailing airport security found in street State-sponsored cyberattacks are now the preferred method of warfare Which vulnerability to fix first? Kenna Security has the answer Endpoint security needs 'efficient efficacy' The Future of Cybersecurity Part II: The Need for Automation Sorry, we lost your data 15 real-world phishing examples — and how to recognize them Cybersecurity Budgets Across the Globe Preparing your business for the quantum security threat, part 2 Largest cybersecurity venture capital deals in 2017 Don't build security tools, build developer tools instead Who wins in a world of 100% encrypted traffic? Homeless, fugitive hacker seeks asylum in Mexico Dark Reading 10 Scariest Ransomware Attacks of 2017 Stop Counting Vulnerabilities & Start Measuring Risk How to Make a Ransomware Payment - Fast Phishing Kits Regularly Reused by Cybercriminals Majority of Employees Hit with Ransomware ... Preventing Credential Theft: A Security Checklist ... It's Time to Change the Cybersecurity Conversation Google Bug Database Flaws Expose Severe Vulnerabilities 'Silence' Trojan Mimics Carbanak to Spy, Steal from ... Average Employee Manages Nearly 200 Passwords 5 Reasons CISOs Should Keep an Open Mind about Social Engineer Spills Tricks of the Trade 4