El Diario del CISO (The CISO Journal) Edición 14 | Page 4

Influencers

Christopher J Hodson MSc , M . Inst . ISP , CISSP Senior Director of Information Security for EMEA
An IdIOT ' s Guide to the Internet of Things
I ' m struggling to think of another profession where ' things ' is a suitable description of a product , service or problem . Everything from a light bulb and a fridge to a car or a plane is now a thing . Because we haven ' t been vague enough already , we throw into the IoT quagmire some real esotericism in the form of Machine Learning and Artificial Intelligence to deliver Smart solutions . I ' m confused . Is IoT really an entirely new set of technologies ?.
The complete article is here
David Froud Director at Core Concept Security
How to Make Lots of Money From GDPR
If you ’ re reading this , you likely fall into 1 of 3 camps : You are horrified at the concept and can ’ t wait to tear me a new one ; You actually think I may be able to help you make lot of money ; or You know me and realise that the title is nothing but click-bait
The complete article is here
Tobias Stone Writing about politics , history , and society .
Your Privacy Is Over
Most of all , I feel for our children . They are growing up in a world where everything is connected , viewable , shared . They obsess over their image , worry about their following and who likes their posts . They suffer from cyberbullying and are exposed to the entire collective consciousness and memory of mankind all at once through their phone .
The complete article is here
Shawn E . Tuma Shawn is an experienced cybersecurity and data privacy attorney .
WHAT DOES IT MEAN TO “ HACK BACK ” AND IS IT A GOOD IDEA ?
There is more and more talk about companies hacking back against those who attack them in cyber space and whether allowing them to take such measures is a good idea . Right now , hacking back , or active defense , as it is often called , is illegal under the federal unauthorized access law , the Computer Fraud and Abuse Act . There are current federal efforts to change this , along with some woefully misguided rumblings by some state legislators ( who do not seem to understand that the CFAA supersedes anything they pass to the contrary ).
The complete article is here
Kim Crawley Cybersecurity journalist at Cylance , AlienVault , Tripwire , Venafi .
What happened with Twitter ’ s password vulnerability ?
Yesterday , Twitter announced that they discovered a vulnerability in how they store the passwords for all 330 million accounts , one of which is mine . It ’ s very likely that one of them is yours too , all