List Headline Image
Updated by sergio-kogan-1 on Oct 19, 2021
 REPORT
50 items   6 followers   0 votes   7 views

Ideas Newsletter4

Two cyber insurance industry initiatives grapple with rise of ransomware - CyberScoop

Twice in the past few weeks, insurers have joined together in response to the spiraling ransomware attacks that have rocked their industry.

CIAS Cyber Threat Defender Card List

When playing Cyber Threat Defender: The Card Game (TCG), generally a player may begin playing with the pre-made starter deck, and then customize their deck with an assortment of cards acquired through booster packs, or from trading with other players, building up their own library of cards. As a player obtains more cards, they may create new decks from scratch from their library.

SC Media | ISAC group unveils pragmatic, attainable cyber standards for school districts

The latest in-depth, unbiased news, analysis and perspective to keep cybersecurity professionals informed, educated and enlightened about the market.

Future proof: Solving the ‘adaptability paradox’ for the long term

Just when leaders need fresh thinking and decisiveness, they tend to fall back on tried-and-true ways. Five actions can transform your relationship with
uncertainty and help you thrive.

The 200 Most Common Online Passwords of 2020 Are Awful

No, ‘naruto,’ ‘yugioh,’ and ‘pokemon’ are not good passwords.

Why psychology could be the answer to cyber-attacks | World Economic Forum

Using psychology to understand the motivation behind cyber-attacks.

Peter Diamandis: ‘In the next 10 years, we’ll reinvent every industry’ | Technology | The Guardian

The entrepreneur and futurologist says the rapid pace of technology should fill us with optimism not fear

The psychology of design: 15 principles every UI/UX designer should know | Dribbble Design Blog

The psychology of design: 15 principles every UI/UX designer should know

Can your personality indicate how you’ll react to a cyberthreat? - Infosec Resources

Introduction All of us are as individual as snowflakes in a winter storm … or so we think. Psychologists beg to differ, and in doing so, attribute five

Additional security has been added.

FBI scams and fraud types

Promoting innovation: 10 ways to promote innovation successfully

Innovations are often a driving force in the entrepreneurial sector in terms of economic success. In digital industries in particular, the exploitation of innovation potential is of great importance. But how can innovations actually be specifically promoted?

10 fundamental UI design principles you need to know | Dribbble Design Blog

10 fundamental UI design principles you need to know

How Hackers Use Our Brains Against Us - WSJ

Cybercriminals take advantage of the unconscious processes that we all use to make decision making more efficient. Blame it on our “lizard brains.”

I Asked GPT-3 About Covid-19. Its Responses Shocked Me. | by Thomas Smith | Sep, 2021 | OneZero

OpenAI’s GPT-3 is the most powerful AI system I’ve ever used. Trained on billions of web pages and tens of thousands of books, the system can generate nearly any kind of text, from news articles to…

Aprendiendo a aprender para jóvenes | Coursera

Offered by Universidad Austral. Aprender a aprender para Jóvenes es para ti, para darte una visión práctica de cómo aprender más ... Enroll for free.

EleutherAI web app testing for language models

Can’t Access GPT-3? Here’s GPT-J — Its Open-Source Cousin | by Alberto Romero | Towards Data Science

GPT-J is the open-source language model analogous to OpenAI's GPT-3.

The List Of Cognitive Biases: A Graphic Of 180+ Heuristics

Cognitive biases are tendencies to selectively search for or interpret data in a way that confirms one's existing beliefs.

50 Cognitive Biases to be Aware of so You Can be the Very Best Version of You

The human brain is pretty tricky: While we think we know things, there’s a whole list of cognitive biases that can be gumming up the works.

Extortion: Strategies | Take Back The Tech

Hrafn Thorri Thórisson Every situation is different. Some blackmailers may be bluffing or may fade away after being refused payment or blocked, while others may aim for real damage. Regardless, it's not your fault. You may feel helpless, but you can take action. The following strategies have proven useful for other survivors. Take initial steps Inform the authorities that you

Action Fraud and the National Crime Agency have been working with Law Enforcement and Regulatory partners to suspend these websites to protect the public.

The Complexity of Trust: PwC’s Trust in US Business Survey

What employees, customers, and business leaders think about business trust and what leaders can do to deliver.

El cuento del tío versión digital: cómo hacen ahora para acceder a tus datos y sacarte toda tu plata

Aunque las barreras de seguridad de ecommerce y bancos son altas, la mayoría se genera porque las personas entregan sus credenciales voluntariamente

Microsoft accounts can now go fully passwordless - The Verge

Microsoft is rolling out a fully passwordless option for Microsoft accounts. It will allow consumers to remove their password and authenticate using an app, security keys, Windows Hello, or SMS / email codes.