Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST NEWS
07
/
15
:
10:01 am
:
Experts Warn of Post-Trump Shooting Misinformation, Scams – Source: www.databreachtoday.com
07
/
14
:
10:00 am
:
Millions of Exim Servers Still Exposed to Critical Flaw – Source: www.databreachtoday.com
07
/
14
:
10:00 am
:
Live Webinar | Is Your Organization Ready for the Next Wave of Endpoint Security Modernization? – Source: www.databreachtoday.com
07
/
13
:
10:00 am
:
CRYSTALRAY Group Targets 1,500 Organizations in 6 Months – Source: www.databreachtoday.com
07
/
13
:
10:00 am
:
FedNow’s First Year: Mixed Bag of Achievements, Challenges – Source: www.databreachtoday.com
07
/
13
:
10:00 am
:
White House Calls for Defending Critical Infrastructure – Source: www.databreachtoday.com
07
/
13
:
10:00 am
:
ISMG Editors: How Should We Handle Ransomware Code Flaws? – Source: www.databreachtoday.com
07
/
13
:
10:00 am
:
Gaining Better Visibility Into Medical Devices, IoT, OT – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
AT&T Details Massive Breach of Subscribers’ Call Logs – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Experts: Federal Privacy Law Needed to Curb AI Data Misuse – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Breach Roundup: Microsoft Patches Zero-Day Active Since 2023 – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Major Health Data Breaches: How Are Trends Shifting in 2024? – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Justifying Your Hybrid Cloud Network Security Investment – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Live Webinar | Navigating Cyber Threats in the GenAI Era: Proven Security Strategies – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Webinar | Old-School Awareness Training Does Not Hack It Anymore – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Multifactor Authentication Shouldn’t Be Optional – Source: www.databreachtoday.com
07
/
12
:
10:00 am
:
Getting From Midlevel to Specialty Niche in Cybersecurity – Source: www.databreachtoday.com
07
/
11
:
10:00 am
:
BitMEX Pleads Guilty to Violating Anti-Money Laundering Laws – Source: www.databreachtoday.com
07
/
11
:
10:00 am
:
Researchers Discover New Malware Aimed at Mining Sector – Source: www.databreachtoday.com
07
/
11
:
10:00 am
:
Widely Used RADIUS Authentication Flaw Enables MITM Attacks – Source: www.databreachtoday.com
CISO STRATEGICS
CYBER ARCHITECTURE
SOC CSIRT OPERATIONS
CYBERSECURITY TOOLS
CYBERSECURITY VENDORS
CYBERSECURITY MSSP
CYBER ORGANIZATIONS
CYBER REGULATIONS
EVENTS & CONFERENCES
VULNs & ZERO DAYS
Latest Published Posts
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Marcos Jaimovich
CISO: The Jedi Master of Cybersecurity. Take Off Strong in Your First 100 Days! Detailed...
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
LSU INFORMATION TECHNOLOGY SERVICES
Basic Shell Scripting
SECUREB4
Brute Force Attacks
The Institute of Internal auditors
Auditing Risk Culture
LATEST CYBER NEWS
Data Breach Today
Experts Warn of Post-Trump Shooting Misinformation, Scams – Source: www.databreachtoday.com
Data Breach Today
Millions of Exim Servers Still Exposed to Critical Flaw – Source: www.databreachtoday.com
Data Breach Today
Live Webinar | Is Your Organization Ready for the Next Wave of Endpoint Security Modernization?...
Data Breach Today
CRYSTALRAY Group Targets 1,500 Organizations in 6 Months – Source: www.databreachtoday.com
Data Breach Today
FedNow’s First Year: Mixed Bag of Achievements, Challenges – Source: www.databreachtoday.com
Data Breach Today
White House Calls for Defending Critical Infrastructure – Source: www.databreachtoday.com
Data Breach Today
ISMG Editors: How Should We Handle Ransomware Code Flaws? – Source: www.databreachtoday.com
Data Breach Today
Gaining Better Visibility Into Medical Devices, IoT, OT – Source: www.databreachtoday.com
Data Breach Today
AT&T Details Massive Breach of Subscribers’ Call Logs – Source: www.databreachtoday.com
Data Breach Today
Experts: Federal Privacy Law Needed to Curb AI Data Misuse – Source: www.databreachtoday.com
Data Breach Today
Breach Roundup: Microsoft Patches Zero-Day Active Since 2023 – Source: www.databreachtoday.com
Data Breach Today
Major Health Data Breaches: How Are Trends Shifting in 2024? – Source: www.databreachtoday.com
CISO2CISO Editors' Picks
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational...
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
Fastercapital.com
How To Launch A Successful B2B Managed Security Services...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up...
IZZMIER
Incident Response Playbooks & Workflows Ready for use in...
FIRE EYE
The Cyber Risk Playbook – What boards of directors...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center)...
LOGPOINT
396 Use Cases & Siem Rules Code ready for...
help net security
Compliance does not equal security !!
Microsoft
Microsoft Zero Trust Maturity Model
Splunk
81 Siem Very important Use Cases for your SOC...
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
SALT
State of the CISO – a global report on...
ACSC Australia
Personal Cyber Security First Steps by Australian Government –...
SentinelOne
90 DAYS A CISO´s Journey to Impact define your...
CISO
STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Osint - Humint
Privacy
Risk & Compliance
Resilience
Social Engineering
Supply Chain Security
CYBER
ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
IOT Security
MAC-OS Security
Metaverse Security
Micro segmentation
Mitre Att&ck
Mobile & 5G Security
Network Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT
OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Malware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY
TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBER
ORGs
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
NSA
NIST Security
SANS
WEF
CYBER
ATTACKS
Cyber Incidents & Attacks Notepad
Data Leak & Breach Incidents Notepad
Crypto theft , stealing & attacks
DDOS Attacks
Mallware & Ransomware
Phising Attacks
Social Engineering
Supply Chain Attacks
BEC
CYBER
CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
CYBER
REGULATIONS
PCI - DSS
ISO 27001
SOX
Latest Published Posts
DevSecOps Guide
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING NODE.JS APPLICATIONS WITH SECURITY CODING PRACTICE
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING AZURE WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact...
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
IGNITE Technologies
COMPREHENSIVE GUIDE ON TSHARK
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial...
HADESS
25 Methods for pipeline attacks
Andrey Prozorov
24 Great Cybersecurity Frameworks
PDPC
ADVISORY GUIDELINES ON THE PDPA FOR CHILDREN’S PERSONAL DATA...
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
White Label Consultancy
Data protection and cyber security in 2024
DATA LOSS PREVENTION (DLP)
CYBERSECURITY
VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY
MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CISO2CISO Editors' Picks
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting...
Splunk
81 Siem Very important Use Cases for your SOC...
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service...
WILEY
Cybercrime Investigators Handbook by WILEY
LOGPOINT
396 Use Cases & Siem Rules Code ready for...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success...
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American...
RedHat
State of Kubernetes Security Report 2022 by RedHat
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness –...
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
IBM Security
How much does a data breach cost in 2022?...
LATEST CYBER NEWS
Data Breach Today
Justifying Your Hybrid Cloud Network Security Investment – Source: www.databreachtoday.com
Data Breach Today
Live Webinar | Navigating Cyber Threats in the GenAI Era: Proven Security Strategies – Source:...
Data Breach Today
Webinar | Old-School Awareness Training Does Not Hack It Anymore – Source: www.databreachtoday.com
Data Breach Today
Multifactor Authentication Shouldn’t Be Optional – Source: www.databreachtoday.com
Data Breach Today
Getting From Midlevel to Specialty Niche in Cybersecurity – Source: www.databreachtoday.com
Data Breach Today
BitMEX Pleads Guilty to Violating Anti-Money Laundering Laws – Source: www.databreachtoday.com
Data Breach Today
Researchers Discover New Malware Aimed at Mining Sector – Source: www.databreachtoday.com
Data Breach Today
Widely Used RADIUS Authentication Flaw Enables MITM Attacks – Source: www.databreachtoday.com
Data Breach Today
Australia Flags Persistent Chinese Cyberespionage Hacking – Source: www.databreachtoday.com
Data Breach Today
Evolve Discloses That Hackers Stole Data of 7.6M Individuals – Source: www.databreachtoday.com
Data Breach Today
Senate NDAA 2025 Boosts Military Cyber and AI Initiatives – Source: www.databreachtoday.com
Data Breach Today
4 Million People Affected by Debt Collector Data Theft Hack – Source: www.databreachtoday.com
Latest Published Posts
PDPC
ADVISORY GUIDELINES ON THE PDPA FOR CHILDREN’S PERSONAL DATA IN THE DIGITAL ENVIRONMENT
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
White Label Consultancy
Data protection and cyber security in 2024
DATA LOSS PREVENTION (DLP)
DARKTRACE
STATE OF AI CYBER SECURITY
AICSSolutions
Cybersecurity Red Team
CERT-EU
Cybersecurity mitigation measures against critical threats
cisco
Cyber Incident Response
ENISA
Baseline Security Recommendations for IoT
HANIM EKEN
Cybersecurity Jobs: Roles, Responsibilities, and Certifications
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
NCSC
Cyber Vitals Checklist V1.0
Agency for Digital Government
Cyber security in supplier relation ships
CYBER4PEAPLE
Cybersecurity Is All About People
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
SG CYBER SAFE
CYBERSECURITY TOOLKIT
CNIL
PRACTICE GUIDE GDPR
CSR Cyber Security Council
CYBERSECURITY GUIDE FOR BOARD ROOM MEMBERS
Australian Government
Enhanced CyberSecurity Obligations
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
UNITES STATES CYBER FORCE
United States Cyber Force A Defense Imperative
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
SYNGRESS
Essential Skills for Hackers
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
Deloitte
Enterprise compliance The Risk Intelligent approach
IGNITE Technologies
Docker Architecture
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
ABB
Differentiation of the IT security standard series ISO 27000 and IEC 62443
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
Detecting Brute Force Attacks
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
UpGuard
DORA Assessment Workbook
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
IGNITE Technologies
JENKINS PENTESTING
Opstune
IOC Scan Framework v2.0
KPMG
Internal audit — Trusted and disrupted
The Offensive labs
HACKING AND SECURING DOCKER CONTAINERS
Federal Office for Information Security
Indirect Prompt Injections
CERTIK
HACK3D THE WEB3 SECURITY REPORT 2023
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Homeland Security
Increasing Threat of DEEP FAKE Identities
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
Security METRICS
Security Metrics Guide to PCI DSS Compliance
A-CAP
GUÍA PRÁCTICA DEL GDPR
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
Thecyphere
Google Cloud Architecture Framework
NACD - Internet Security Alliance
CYBER-RISK OVERSIGHT HANDBOOK FOR CORPORATE BOARDS
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
IoT Security Institute
Smart Cities & Critical Infrastructure Framework
MegaCorp One
Sample Penetration Test Report
Neurorights
Safeguarding Brain Data: Assessing the Privacy Practices of Consumer Neurotechnology Companies
FORTINET
Routing in FortiGate
CRC Press
Risk and Privacy FREE BOOK
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
GAO
CYBERSECURITY Improvements Needed in Addressing Risks to Operational Technology
ENISA
Remote ID Proofing Good Practices
HADESS
RedTeam Tips Orchestrating Chaos Evading Defense Culture
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
PICUS
Red Report 2024 – The Top 10 Most Prevalent MITRE ATT&CK® Techniques The Rise of...
CISO2CISO Editors' Picks
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center)...
Ciso Council
CISO Security Officer Handbook
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP –...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN...
CyberDB
Best 160 Cybersecurity Groups On LinkedIn by CyberDB
SentinelOne
90 DAYS A CISO´s Journey to Impact define your...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS...
HADESS
Introduction to Doxing- OSINT methods for information gathering by...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK: FIRST 100 DAYS Setting the CISO up...
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity –...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services...
Ciso Council
CISO Security Officer Handbook
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos –...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success...
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP –...
Microsoft
Microsoft Zero Trust Maturity Model
Splunk
81 Siem Very important Use Cases for your SOC...
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
help net security
Compliance does not equal security !!
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have...
FIRE EYE
The Cyber Risk Playbook – What boards of directors...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber...
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s...
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service...
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A...
Elevate Security
High Risk Users and Where to Fin Them by...
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
SALT
State of the CISO – a global report on...
HADESS
DevSecOps Guides – Comprehensive resource for integrating security into...
Latest Published Posts
Red Canary
Threat Detection Report 2024
ISACA
Recommended Skills for a Cyber Security Career
Marine Pichon
Ransomware Cartography (2014-2024)
HADESS
Pwning the Domain Persistence
SANS
Purple Concepts Bridging the Gap
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Michael Tchuindjang
Phishing Attack Pentesting Guide
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
IPA
Practical Examples ofSecurity Risk Assessmentfor Industrial Control Systems
NCSC
Office 365 Secure Confirmation Framework
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA...
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
FUTURE OF PRIVACY FORUM
Generative AI for Organizational Use:Internal Policy Checklist
ENISA
Best Practices for Cyber Crisis Management
Center for Internet Security
A Guide to Defining Reasonable Cybersecurity
viehgroup
AWS Cloud Security Checklist
aws
AWS Blueprint for Ransomware Defense
DevSecOps Guide
Attacking .NET
U.S. Department of Homeland Security
MITIGATING ARTIFICIAL INTELLIGENCE (AI) RISK: Safety and Security Guidelinesfor Critical Infrastructure Ownersand Operators
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
Gobierno de España
Informe Anual de Seguridad Nacional 2023
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
NCSC
NIS 2A Quick Reference Guide
INCIDENT RESPONSE PLAN
ISO 27001:2022
INCIDENT REPORTING TEMPLATE
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Microsoft Security
From plan to deployment: Implementing a cloud-native application protection platform(CNAPP) strategy
GmFaruk
Identity and Access Management Policy
NIST
Artificial Intelligence Risk Management Framework
UK HM Government
National Cyber Strategy 2022
ISO 27701
Ley Marco de Ciberseguridad e Infraestructura Crítica de la Información
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
NCSC
NIS 2A Quick Reference Guide
INCIDENT RESPONSE PLAN
ISO 27001:2022
INCIDENT REPORTING TEMPLATE
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Microsoft Security
From plan to deployment: Implementing a cloud-native application protection platform(CNAPP) strategy
GmFaruk
Identity and Access Management Policy
NIST
Artificial Intelligence Risk Management Framework
UK HM Government
National Cyber Strategy 2022
ISO 27701
Ley Marco de Ciberseguridad e Infraestructura Crítica de la Información
HADESS
MALWARE DEVELOPMENT PROCESS DIARIES
HADESS
MALWARE DEVELOPMENT EVADING DIARIES
NSA
NSA Network Infrastructure Security Guide
NIST
NIST SP 800 Incident Response Recommendations and Considerations for Cybersecurity Risk Management
NIST
NIST Policy Template Guide
NIST
NIST AI_Risk Management Framework Playbook
Thecyphere
Malware prevention tips for businesses
CheatSheet
Mail Server Attacks Cheat Sheet
ministry of security
MERGERS AND ACQUISITIONS
HADESS
Loaders Unleashed
THE LINUX FUNDATION
Linux Privilege Escalation
CEPS
Artificial Intelligence and Cybersecurity
Kingdom of Saudi Arabia
National Cybersecurity Strategy
LogRhythm
How to build a SOC with limited resources
Kubernetes
Kubernetes and Cloud Native Associate (KCNA) Study Guide
Australian Government
Management structures and responsibilities
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Hacker Combat
How are Passwords Cracked ? by Hacker Combat.
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Users Most Viewed Posts
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
National Cyber Security
Common cyber attacks: reducing the impact
HONEYWELL FORGE
Industrial Cybersecurity USB Threath Report 2022 – Threats designed for USB exploitation rise to 52%....
ASPIRE SYSTEMS
A Complete Guide to Implementing DevSecOps in AWS by aspire
Splunk
The Transformational CISOs Guide to Security Orchestration, Automation and Response – How giving security teams...
Wiley Brand for Dummies
API Security for Dummies Series – Data Theorem Special Edition
IGNITE Technologies
Nmap for Pentesters – A Beginners Guide By Ignite Technologies
NIST
Guide to a Secure Enterprise Network Landscape NIST SP 800-215
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
COMPASS SECURITY
Hacking Tools Cheat Sheet by Compass Security
Pouyan Zamani
SNORT Rule Writing Guide by Pouyan Zamani
IST RANSOM TASKFORCE
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
Paul Agbabian
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
VINOD KUMAR
Telecom Threat Detection via Stride Mapping Case Study
Google Cybersecurity Action Team
Modern Data Security – A path to autonomic data security by Dr. Anton Chuvakin and...
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
TOP Featured POSTS
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
MALTEGO
Maltego handbook for Incident Response
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
CAREER UP
7 Steps to your Cybersecurity Career – How to begin your career in Cibersecurity By...
NHTSA
Cybersecurity Best Practices for the Safety of Modern Vehicles – Updatd 2022 by NHTSA
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
Ben McCarty - No Start Press
Cyberjutsu – Cybersecurity for the Modern Ninja by Ben McCarty
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
Google Cybersecurity Action Team
Modern Data Security – A path to autonomic data security by Dr. Anton Chuvakin and...
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
Joas Antonio
Windows Persistence Techniques by Joas Antonio
Alejandro Corletti - Darfe.es
Libro Ciberseguridad – Una estrategia Informatica-Militar by Alejandro Corletti Estrada – darfE.es
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
Unbound Security
The Cybersecurity Acronym Book
HEIDRICK & STRUGGLES
2022 Global Chief Information Security Officer (CISO) Survey by HEIDRICK & STRUGGLES – SPECIALITY PRACTICES...
Interpol
GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS BY INTERPOL
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
Matteo Meucci and Andrew Muller
OWASP Testing Guide 4.0 by Matteo Meucci and Andrew Muller
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
SecurityGen
5G Cybersecurity – Telecom Cybersecurity – Decoding the ecosystem and its vulnerabilities by SecurityGen –...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
CLOUDFLARE
Simplifying the way we protect SaaS applications – How to protect users and data with...
varonis
Pentesting Active Directory Environments by VARONIS
RedHat
State of Kubernetes Security Report 2022 by RedHat
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
Views: 1765