El Diario del CISO Volumen 9 | Page 10

Cyber security should be considered in the supplier selection process – IT Governance Blog www.itgovernance.co.uk Exploiting Windows Machine with DDE Exploit www.hackingarticles.in Preparing your business for the quantum security threat: Part I - Data Security Blog blog.thalesesecurity.com FDA Official Dispels Medical Device Security Myths www.careersinfosecurity.com Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - The New York Times www.nytimes.com WikiLeaks Starts Releasing Source Code For Alleged CIA Spying Tools - Motherboard motherboard.vice.com 10