Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST NEWS
10
/
10
:
11:00 pm
:
European Council Adopts Cyber Resilience Act – Source: www.databreachtoday.com
10
/
10
:
11:00 pm
:
Operation Cronos Is Disrupting LockBit, Says UK Official – Source: www.databreachtoday.com
10
/
10
:
11:00 pm
:
Relyance AI Raises $32M to Take on AI Governance Challenges – Source: www.databreachtoday.com
10
/
10
:
11:00 pm
:
SSA Struggling to Modernize Fraud Prevention Tech, GAO Warns – Source: www.databreachtoday.com
10
/
10
:
11:00 pm
:
Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR – Source: www.databreachtoday.com
10
/
10
:
11:00 pm
:
How AI Shields Enterprises from Advanced Email Attacks – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Australia May Require Businesses to Report Ransom Payments – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Marriott Pays $52M to Settle US States Data Breach Litigation – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Human Security Raises $50M+ to Take on Click-Fraud Defense – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
US DOJ Developing Guidelines for AI Use in Law Enforcement – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Not Your Grandparent’s AI: New Age of Cybersecurity and IT Management – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Critical Deadlines Approaching: Google’s 90-Day Certificates and the Urgency of ACME Automation – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Live Webinar | Protecting Critical Infrastructure with Unified Remote Access and Threat Detection – Source: www.databreachtoday.com
10
/
09
:
11:00 pm
:
Career Spotlight: The Growing Demand for OT Security Experts – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
EU Strengthens Sanctions Against Russian Hackers – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
Cloudflare Acquires Kivera to Fuel Preventive Cloud Security – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
MI5 Chief Warns of Cyberthreats to the UK – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
UN Says Asian Cybercrime Cartels Are Rising Global Threat – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
Ransomware Intelligence Briefing: Key Insights for the C-Level – Source: www.databreachtoday.com
10
/
08
:
11:00 pm
:
Study: 92% of Healthcare Firms Hit by Cyberattacks This Year – Source: www.databreachtoday.com
CISO2CISO Advisors recomended posts
N/A
Security Metrics & KPIs for Measuring SOC Success – Measure Up: How SOC Metrics Elevate...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Marcos Jaimovich
CISO: The Jedi Master of Cybersecurity. Take Off Strong in Your First 100 Days! Detailed...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
CISO2CISO Advisors recomended posts
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
HADESS
Introduction to Doxing- OSINT methods for information gathering by HADESS
Ciso Council
CISO Security Officer Handbook
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
IBM Security
How much does a data breach cost in 2022? IBM Cost of a Data Breach...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
Elevate Security
High Risk Users and Where to Fin Them by Elevate Security
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
Lester Chng
How to Define Objetives for Cybersecurity Tabletop Exercises by Lester Chng
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
MSSP ALERT
TOP 250 MSSPs 2022 edition by MSSP Alert – A CyberRisk Alliance Resource
Marcos Jaimovich
FIRST.Org CVSS V4.0 Releasead – Navigation the Evolution – Dive into CVSS 4.0 Unveiled by...
CISO2CISO SOC OPERATIONS VALLEY
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
not known
Threat Intelligence & Dark web Monitoring Tools
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Latest Published Posts
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
Gartner
Gartner Security & Risk Management Summit
FS.ISAC
Navigating Cyber
LATEST CYBER NEWS
Data Breach Today
European Council Adopts Cyber Resilience Act – Source: www.databreachtoday.com
Data Breach Today
Operation Cronos Is Disrupting LockBit, Says UK Official – Source: www.databreachtoday.com
Data Breach Today
Relyance AI Raises $32M to Take on AI Governance Challenges – Source: www.databreachtoday.com
Data Breach Today
SSA Struggling to Modernize Fraud Prevention Tech, GAO Warns – Source: www.databreachtoday.com
Data Breach Today
Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR –...
Data Breach Today
How AI Shields Enterprises from Advanced Email Attacks – Source: www.databreachtoday.com
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
IBM Security
IBM Security – Cost of a Data Breach Report 2021
Center for Internet Security
CIS Software Supply Chain Security Guide by Center for Internet Security (CIS)
US Deparment of Energy
Cibersecurity Capability Maturity Model (C2M2) by US Department of Energy
Carnegie Mellon University
Cyber Intelligence Tradecraft Report by Carnegie Mellon University
World Economic Forum
Advancing Supply Chain Security in Oil and Gas an Industry Analysis by World Economic Forum
CISA
CISA 5G Security Evaluation Process Investigation v1
Microsoft
Protecting critical Infrastructure against cyber threats – An analysis of relevant regulation, good practices, international...
IST RANSOM TASKFORCE
Combating Ransomware – A Comprehensive Framework for Action Key Recommendations from the Ransomare Task Force...
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
ASPIRE SYSTEMS
A Complete Guide to Implementing DevSecOps in AWS by aspire
QUANTINUUM
The CISOs Guide to Post-Quantum Standarization by QUANTINUUM
expel
MITRE ATT&CK in Google Cloud Platform (GCP) – A defender’s cheat sheet by expel
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
LUMU
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
LATEST CYBER NEWS
Data Breach Today
Australia May Require Businesses to Report Ransom Payments – Source: www.databreachtoday.com
Data Breach Today
Marriott Pays $52M to Settle US States Data Breach Litigation – Source: www.databreachtoday.com
Data Breach Today
Human Security Raises $50M+ to Take on Click-Fraud Defense – Source: www.databreachtoday.com
Data Breach Today
US DOJ Developing Guidelines for AI Use in Law Enforcement – Source: www.databreachtoday.com
Data Breach Today
Not Your Grandparent’s AI: New Age of Cybersecurity and IT Management – Source: www.databreachtoday.com
Data Breach Today
Critical Deadlines Approaching: Google’s 90-Day Certificates and the Urgency of ACME Automation – Source: www.databreachtoday.com
Latest Published Posts
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
ThreatMon
GLOBAL CYBER THREAT REPORT
Gary Hinson
Getting started withsecurity metrics
CAPACITACION USACH
Gestión de Riesgos de Ciberseguridad
EDPS
Generative AI and the EUDPR.
Bright
2024 Guide to Application Security Testing Tools
CSA Singapure
GUIDE TO CYBER THREAT MODELLING
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
LATEST CYBER NEWS
Data Breach Today
Live Webinar | Protecting Critical Infrastructure with Unified Remote Access and Threat Detection – Source:...
Data Breach Today
Career Spotlight: The Growing Demand for OT Security Experts – Source: www.databreachtoday.com
Data Breach Today
EU Strengthens Sanctions Against Russian Hackers – Source: www.databreachtoday.com
Data Breach Today
Cloudflare Acquires Kivera to Fuel Preventive Cloud Security – Source: www.databreachtoday.com
Data Breach Today
MI5 Chief Warns of Cyberthreats to the UK – Source: www.databreachtoday.com
Data Breach Today
UN Says Asian Cybercrime Cartels Are Rising Global Threat – Source: www.databreachtoday.com
Data Breach Today
Ransomware Intelligence Briefing: Key Insights for the C-Level – Source: www.databreachtoday.com
Data Breach Today
Study: 92% of Healthcare Firms Hit by Cyberattacks This Year – Source: www.databreachtoday.com
Data Breach Today
Top Priorities of Today’s Cybersecurity Leader – Source: www.databreachtoday.com
Data Breach Today
Ukrainian Pleads Guilty for Role in Raccoon Stealer Malware – Source: www.databreachtoday.com
Data Breach Today
IronNet Settles Securities Fraud Class Action Suit for $6.6M – Source: www.databreachtoday.com
Data Breach Today
DHS Warns Election Security Risks May Persist Into 2025 – Source: www.databreachtoday.com
Latest Published Posts
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
INCIBE & SPAIN GOVERNMENT
Nuevas normativas de 2024 de ciberseguridad para vehículos
NATIONAL DEMOCRATIC INSTITUTE
Manual de Ciberseguridad
INNOVERY
RESILIENCIA
ACSC Australia
Choosing secureand verifiable technologies
CEH
Certifications Preparation Guide
Center for Security Studies (CSS)
CYBERDEFENSE REPORT
Sandhya Kaushik
Checklist for Securing Your Android Apps
SentinelLABS
CHAMELGANG & FRIENDS | CYBERESPIONAGE GROUPS ATTACKING CRITICAL INFRASTRUCTURE WITH RANSOMWARE
aDvens
May Cyber Threat Intelligence monthly report
CCN
Guía de Seguridad de las TIC CCN-STIC 885A
Insikt Group
Caught in the Net
IGNITE Technologies
BURP SUITE FOR PENTESTER TURBO INTRUDER
Views: 5852