Ciberseguridad + ...
Follow
Find
14.9K views | +0 today
 
Scooped by Elisa Vivancos
onto Ciberseguridad + Inteligencia
Scoop.it!

Retos de la seguridad de la información en un mundo global

Retos de la seguridad de la información en un mundo global | Ciberseguridad + Inteligencia | Scoop.it
Los retos a los que se enfrenta la sociedad digital actual pasan inevitablemente por la defensa activa de la seguridad y la privacidad de sus integrantes: ciudadanos, empresas, organizaciones y países en su conjunto.
more...
No comment yet.
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Authentication Trends: The promise of of cognitive fingerprinting

Authentication Trends: The promise of of cognitive fingerprinting | Ciberseguridad + Inteligencia | Scoop.it
Cognitive fingerprinting, the measure of how users behave when interacting with a device and their writing styles, is emerging as a possible new ...
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence
Scoop.it!

#Security: Silenced for two years by #Volkswagen, #car #hackers reveal their paper into security hole

#Security: Silenced for two years by #Volkswagen, #car #hackers reveal their paper into security hole | Ciberseguridad + Inteligencia | Scoop.it
“Two years ago, a trio of researchers were preparing to present the findings of their investigation into the security of car immobilisers used by luxury cars.”
Via Frederic GOUTH
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

5 niños-genio con un futuro en la ciber-seguridad

5 niños-genio con un futuro en la ciber-seguridad | Ciberseguridad + Inteligencia | Scoop.it
En este post les presentamos 5 niños-genio que seguramente serán parte de la industria de la seguridad de la información en un futuro.
more...
No comment yet.
Rescooped by Elisa Vivancos from Security new's
Scoop.it!

Top countries best prepared against cyberattacks

Top countries best prepared against cyberattacks | Ciberseguridad + Inteligencia | Scoop.it

Which countries are most resilient to cyber crime?


Via Marc Cierpisz
more...
Gust MEES's curator insight, August 13, 1:09 PM

Which countries are most resilient to cyber crime?


Learn more / En savoir plus / Mehr erfahren:


https://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time


Rescooped by Elisa Vivancos from Informática Forense
Scoop.it!

Arqueólogos que excavan en la red

Arqueólogos que excavan en la red | Ciberseguridad + Inteligencia | Scoop.it

Si en un futuro muy cercano decides hacerte arqueólogo tendrás que tener muy claro si lo tuyo son las excavaciones milenarias o si tu vocación se orienta más a un concepto de esta labor relativo a las nuevas tecnologías: la arqueología digital.

Con una nomenclatura que evoca tiempos remotos, esta nueva profesión parece abocada al éxito si atendemos al hecho de que hasta al ciudadano de a pie le preocupa cada vez más la imagen que proyecta en internet. Y es que si se es en la medida en que se está en las redes sociales, la labor del arqueólogo digital se convertirá cada vez más en esencial en nuestra nueva sociedad.

"Cada vez más la vida pública ligada al trabajo se desarrolla 'on line'; ylo que haces hoy te puede hipotecar algo que puedes tener dentro de 10 años", afirma Javier Leiva, consultor experto en reputación digital.


Via Javier Pagès López
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Rackspace to host cloud security sharing centre | ZDNet

Rackspace to host cloud security sharing centre | ZDNet | Ciberseguridad + Inteligencia | Scoop.it
The Cloud Security Alliance wants the big names in the cloud industry to join forces to tackle security threats in the cloud space that would see providers sharing information before an attack hits another firm.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

World's Biggest Data Breaches & Hacks - Information Is Beautiful

World's Biggest Data Breaches & Hacks - Information Is Beautiful | Ciberseguridad + Inteligencia | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

How the way you type can shatter anonymity—even on Tor

How the way you type can shatter anonymity—even on Tor | Ciberseguridad + Inteligencia | Scoop.it
Researchers perfect technique that profiles people based on unique keystroke traits.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Accuvant researchers to release open source RFID access tool

Accuvant researchers to release open source RFID access tool | Ciberseguridad + Inteligencia | Scoop.it
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Mind Over Matter: The Importance of Intelligence in Your Threat Program

Mind Over Matter: The Importance of Intelligence in Your Threat Program | Ciberseguridad + Inteligencia | Scoop.it
An effective threat intelligence program is a fusion of data and human analysis and interpretation.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Australian Cyber Security Centre uses discredited data to quantify infosec threats

Australian Cyber Security Centre uses discredited data to quantify infosec threats | Ciberseguridad + Inteligencia | Scoop.it
The numbers are down, but Australia's Oz Cyber ForceTM says things are getting worse
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet | Ciberseguridad + Inteligencia | Scoop.it
Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Managing third parties with enterprise IAM

Managing third parties with enterprise IAM | Ciberseguridad + Inteligencia | Scoop.it
In this enterprise IAM video, Michael Cobb discusses identity and access management of non-employees and how to control third parties that are less security-minded.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Horizonte 2020: La Unión Europea financia el proyecto de NetApp para la optimización del rendimiento cloud - Noticias - Infraestructuras TIC - techWEEK.es

Horizonte 2020: La Unión Europea financia el proyecto de NetApp para la optimización del rendimiento cloud - Noticias - Infraestructuras TIC - techWEEK.es | Ciberseguridad + Inteligencia | Scoop.it
Infraestructuras TIC: El programa Horizonte 2020 de la Unión Europea concede 6,7 millones de euros al proyecto de optimización del rendimiento del cloud coordinado por NetApp. El proyecto, de tres años de duración, tiene como objetivo crear una infraestructura de cloud privado de alto rendimiento y que permita un escalado flexible
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | Ciberseguridad + Inteligencia | Scoop.it

Brian KREBS @briankrebs (Twitter)

 

A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.

 

I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.

 

Learn more:

 

https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 


Via Gust MEES
more...
Gust MEES's curator insight, August 16, 12:22 PM

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Scooped by Elisa Vivancos
Scoop.it!

¿Cómo medir el estado de la seguridad de la información?

¿Cómo medir el estado de la seguridad de la información? | Ciberseguridad + Inteligencia | Scoop.it
Cuando se gestiona la seguridad corporativa, es importante conocer si se realizan las iniciativas adecuadas que contribuyan a alcanzar esta meta.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Nuevo modo de hackeo amenaza datos en Google Drive, Dropbox y OneDrive

Nuevo modo de hackeo amenaza datos en Google Drive, Dropbox y OneDrive | Ciberseguridad + Inteligencia | Scoop.it
"El Hombre en la Nube" se llama el método que fue demostrado en la conferencia sobre seguridad Black Hat, y que revela una enorme vulnerabilidad de los sistemas de almacenamiento online.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Somos datos: privacidad y límites del big data | Ignasi Alcalde

Somos datos: privacidad y límites del big data | Ignasi Alcalde | Ciberseguridad + Inteligencia | Scoop.it
Hoy en día no somos sólo consumidores de datos, somos productores de grandes cantidades de datos de nuestra vida
more...
No comment yet.
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Disaster Recovery and the Big Data Application -- Recovery Options

Big data implementations that produce value drive lower costs and higher profits. Hence, at some point you must implement a disaster recovery plan.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com | Ciberseguridad + Inteligencia | Scoop.it
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Applying threat intelligence and what is the Dark Web?

Applying threat intelligence and what is the Dark Web? | Ciberseguridad + Inteligencia | Scoop.it
In this edition of The Irari Report, Ira Winkler and Araceli Treu Gomes interview Kurt Stammberger of Norse Corporation about both what has come to be know as the Dark Web and Threat Intelligence. This is among the most comprehensive discussions of threat intelligence available to practitioners.
Elisa Vivancos's insight:

video

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83%

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83% | Ciberseguridad + Inteligencia | Scoop.it
In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

No building access card? No problem if you have new Def Con tools

No building access card? No problem if you have new Def Con tools | Ciberseguridad + Inteligencia | Scoop.it
RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog | Ciberseguridad + Inteligencia | Scoop.it
La CNMC (Comisión Nacional de Mercados y Competencia) ha aprobado unos nuevos criterios de calificación de contenidos audiovisuales. Se han identificado si
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Finding The ROI Of Threat Intelligence: 5 Steps

Finding The ROI Of Threat Intelligence: 5 Steps | Ciberseguridad + Inteligencia | Scoop.it
Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.
more...
No comment yet.