El Diario del CISO Volumen 9 | Page 5

Cybersecurity’s believe it or not Information security – let's get physical Data breached in translation Why you should fear phishing more than data breaches Dealing with a shortage of information security and IT skill sets Ransomware marketplaces and the future of malware: Salted Hash Ep. 6 Fine-Tune Your CyberSecurity Budget for the Changing Threat Landscape What is ransomware? How it works and how to remove it How To Beat Cybercrime’s Prey-and-Pay Villains Securing the digital transformation of our critical infrastructure Just how secure are Smart Contracts? The interdependency of people, policy and products amid a cybersecurity talent shortage Malwarebytes is tracking missed detections in traditional antivirus The interdependency of people, policy and products amid a cybersecurity talent shortage Securing the digital transformation of our critical infrastructure Help Net Security Connected technologies will accelerate security threats to healthcare industry Security, privacy issues we need to solve before non-medical implants become pervasive Digital business is turning CIOs into leaders The Wild West of drive-by cryptocurrency mining Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies Top 10 ways to fund the shift to digital business Have you heard about Bitcoin multipliers? Top digital transformation challenges? Cybercrime and espionage IoT anxiety is consuming security professionals Worldwide digital transformation predictions Microsoft offers mitigation advice for DDE attacks scenarios TechRepublic Equifax breach gives IT $87.5 million reminders to apply critical security patches NATO to boost cyberdefenses with cyberweapons Report: 40% of IT security leaders don't change default admin passwords Report: 60% of developers lack confidence in their app security, but don't take steps to fix it 5