Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST NEWS
09
/
09
:
10:00 pm
:
Progress Software Fixes Critical LoadMaster Vulnerability – Source: www.databreachtoday.com
09
/
09
:
10:00 pm
:
US Prepares to Gather AI Foundational Model Developer Info – Source: www.databreachtoday.com
09
/
09
:
10:00 pm
:
Darktrace CEO Swap: Gustafsson Steps Down; Popelka Steps Up – Source: www.databreachtoday.com
09
/
09
:
10:00 pm
:
Hackers Target Taiwan UAV, Military Industries – Source: www.databreachtoday.com
09
/
09
:
10:00 pm
:
Secure Your Applications: Learn How to Prevent AI-Generated Code Risk – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
Texas AG Hopes to Upend HIPAA Rules to Investigate Abortions – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
Absolute Purchases Syxsense to Tackle Cyber Vulnerabilities – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
Feds Warn Health Sector to Patch Apache Tomcat Flaws – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
White House Launches Cyber, Tech and AI Hiring Sprint – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
Assuming control | Can AI reach Autonomous Levels? – Source: www.databreachtoday.com
09
/
06
:
10:00 pm
:
Modernize Your Security Architecture with SASE – Source: www.databreachtoday.com
09
/
05
:
10:00 pm
:
RansomHub Claims Theft of Montana Planned Parenthood Data – Source: www.databreachtoday.com
09
/
05
:
10:00 pm
:
Kaspersky US Customers Migrate to Pango’s UltraAV After Ban – Source: www.databreachtoday.com
09
/
05
:
10:00 pm
:
Former OpenAI Scientist’s Startup Raises $1B Seed Funding – Source: www.databreachtoday.com
09
/
05
:
10:00 pm
:
FEMA Has Begun Deploying Cyber Advisers to Disaster Zones – Source: www.databreachtoday.com
09
/
04
:
10:00 pm
:
Dutch Agency Fines Clearview AI 30M Euros for Data Scraping – Source: www.databreachtoday.com
09
/
04
:
10:00 pm
:
NSA Eyes Global Partnerships to Combat Chinese Cyberthreats – Source: www.databreachtoday.com
09
/
04
:
10:00 pm
:
Federal CIO Says Agencies on Track for Zero Trust Milestones – Source: www.databreachtoday.com
09
/
04
:
10:00 pm
:
Telegram Removes Deepfake Videos at South Korea’s Behest – Source: www.databreachtoday.com
09
/
04
:
10:00 pm
:
AI Model Security Challenges: Financial and Healthcare Data – Source: www.databreachtoday.com
CISO STRATEGICS
CYBER ARCHITECTURE
SOC CSIRT OPERATIONS
CYBERSECURITY TOOLS
CYBERSECURITY VENDORS
CYBERSECURITY MSSP
CYBER ORGANIZATIONS
CYBER REGULATIONS
EVENTS & CONFERENCES
VULNs & ZERO DAYS
Latest Published Posts
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Marcos Jaimovich
CISO: The Jedi Master of Cybersecurity. Take Off Strong in Your First 100 Days! Detailed...
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s Unspoken Nightmare.
Observer Research Foundation
A ROADMAP FOR AI GOVERNANCE
IGNITE Technologies
A Little Guide to SMB Enumeration
LogRhythm
A Guide to User and Entity Behavior Analytics (UEBA)
CREST
A Guide to Penetration Testing
BONI YEAMIN
100 Offensive Linux Security Tools
LATEST CYBER NEWS
Data Breach Today
Progress Software Fixes Critical LoadMaster Vulnerability – Source: www.databreachtoday.com
Data Breach Today
US Prepares to Gather AI Foundational Model Developer Info – Source: www.databreachtoday.com
Data Breach Today
Darktrace CEO Swap: Gustafsson Steps Down; Popelka Steps Up – Source: www.databreachtoday.com
Data Breach Today
Hackers Target Taiwan UAV, Military Industries – Source: www.databreachtoday.com
Data Breach Today
Secure Your Applications: Learn How to Prevent AI-Generated Code Risk – Source: www.databreachtoday.com
Data Breach Today
Texas AG Hopes to Upend HIPAA Rules to Investigate Abortions – Source: www.databreachtoday.com
Data Breach Today
Absolute Purchases Syxsense to Tackle Cyber Vulnerabilities – Source: www.databreachtoday.com
Data Breach Today
Feds Warn Health Sector to Patch Apache Tomcat Flaws – Source: www.databreachtoday.com
Data Breach Today
White House Launches Cyber, Tech and AI Hiring Sprint – Source: www.databreachtoday.com
Data Breach Today
Assuming control | Can AI reach Autonomous Levels? – Source: www.databreachtoday.com
Data Breach Today
Modernize Your Security Architecture with SASE – Source: www.databreachtoday.com
Data Breach Today
RansomHub Claims Theft of Montana Planned Parenthood Data – Source: www.databreachtoday.com
CISO2CISO Editors' Picks
LOGPOINT
396 Use Cases & Siem Rules Code ready for...
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP –...
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members...
Ciso Council
CISO Security Officer Handbook
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN...
IZZMIER
Incident Response Playbooks & Workflows Ready for use in...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber...
SALT
State of the CISO – a global report on...
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en...
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness –...
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members...
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development...
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
Splunk
81 Siem Very important Use Cases for your SOC...
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for...
CISO
STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Osint - Humint
Privacy
Risk & Compliance
Resilience
Social Engineering
Supply Chain Security
CYBER
ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
IOT Security
MAC-OS Security
Metaverse Security
Micro segmentation
Mitre Att&ck
Mobile & 5G Security
Network Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT
OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Malware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY
TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBER
ORGs
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
NSA
NIST Security
SANS
WEF
CYBER
ATTACKS
Cyber Incidents & Attacks Notepad
Data Leak & Breach Incidents Notepad
Crypto theft , stealing & attacks
DDOS Attacks
Mallware & Ransomware
Phising Attacks
Social Engineering
Supply Chain Attacks
BEC
CYBER
CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
CYBER
REGULATIONS
PCI - DSS
ISO 27001
SOX
Latest Published Posts
CYTAD
100-Question Cybersecurity checklist for small businesses
SentinelOne
90 DAYS A CISO’S JOURNEY TO IMPACT
RedTeamRecipe
64 METHODS FOR MIMIKATZ EXECUTION
ChiefExecutive
Ciberseguridad: Prioridad Estratégica para los CEO.
ACS
Cybersecurity Threats Challenges Opportunities
WHITE PAPER
Strategic Cybersecurity Talent Framework
Barkly
CYBERSECURITY PLAYBOOK
CYBER SECURITY COALITION
CYBER SECURITY INCIDENT MANAGEMENT GUIDE
Compliance Forge
Cybersecurity Frameworks Comparison
INL/EXT
Cybersecurity for Distributed Wind
AFG
Cybersecurity – DORA Practical Guide
ARTIC WOLF
Cybersecurity Compliance Guide
ESRAA MOHAMAD
ELEARN SECURITY CERTIFIED INCIDENT RESPONSE
CENTRE FOR CYBER SECURITY
Effective Cyber Defence
DRAGOS
Impact of FrostyGoop ICS Malware on Connected OT Systems
European Central Bank
Draft Guide on Governance and Risk Culture
Victor Tong
Digital Operational Resilience Act – Control Mappings
ministry of security
Unveiling the Magic of DORA -Digital Operational Resilience Act
CYBERSECURITY
VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY
MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CISO2CISO Editors' Picks
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP –...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals...
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No...
Apress
Jump-start Your SOC Analyst Career – A Roadmap to...
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian...
SALT
State of the CISO – a global report on...
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos –...
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success...
IBM Security
How much does a data breach cost in 2022?...
CyberDB
Best 160 Cybersecurity Groups On LinkedIn by CyberDB
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
LATEST CYBER NEWS
Data Breach Today
Kaspersky US Customers Migrate to Pango’s UltraAV After Ban – Source: www.databreachtoday.com
Data Breach Today
Former OpenAI Scientist’s Startup Raises $1B Seed Funding – Source: www.databreachtoday.com
Data Breach Today
FEMA Has Begun Deploying Cyber Advisers to Disaster Zones – Source: www.databreachtoday.com
Data Breach Today
Dutch Agency Fines Clearview AI 30M Euros for Data Scraping – Source: www.databreachtoday.com
Data Breach Today
NSA Eyes Global Partnerships to Combat Chinese Cyberthreats – Source: www.databreachtoday.com
Data Breach Today
Federal CIO Says Agencies on Track for Zero Trust Milestones – Source: www.databreachtoday.com
Data Breach Today
Telegram Removes Deepfake Videos at South Korea’s Behest – Source: www.databreachtoday.com
Data Breach Today
AI Model Security Challenges: Financial and Healthcare Data – Source: www.databreachtoday.com
Data Breach Today
Oswal: AI, Platformization Key to Network Security Evolution – Source: www.databreachtoday.com
Data Breach Today
Specialize in Securing Critical Infrastructure – Source: www.databreachtoday.com
Data Breach Today
Is Your SIEM Ready for the AI Era? Essential Insights and Preparations – Source: www.databreachtoday.com
Data Breach Today
US NTIA Probes Data Center Security Risks – Source: www.databreachtoday.com
Latest Published Posts
CENTRE FOR CYBER SECURITY
Effective Cyber Defence
DRAGOS
Impact of FrostyGoop ICS Malware on Connected OT Systems
European Central Bank
Draft Guide on Governance and Risk Culture
Victor Tong
Digital Operational Resilience Act – Control Mappings
ministry of security
Unveiling the Magic of DORA -Digital Operational Resilience Act
ARMIS
DORA Resiliency Guide Strengthening Cybersecurity and Operational Resilience in the Financial Sector
IGNITE Technologies
Domain Persistence Golden Ticket Attack
IGNITE Technologies
Docker Penetration Testing
Rajneesh Gupta
Docker Security CHECKLIST
IGNITE Technologies
Disk Group Privilege Escalation
Homeland Security
DEPARTMENT OF HOMELAND SECURITY ARTIFICIAL INTELLIGENCE ROADMAP 2024
Hiral Patel
Data LossPrevention(DLP)
DevSecOps Guide
DevSecOps Security Architecture
Polygon
Digital identity – Deutsche Bank Corporate Bank
HADESS
DevSecOps Security Architecture
CSA Cloud Security Alliance
The Six Pillars of DevSecOps:Collaboration andIntegration
GitHub
The enterprise guide toAI-powered DevSecOps
ASPIRE SYSTEMS
A complete guide toImplementingDevSecOps in AWS
Harness
Definitive Guide to Secure Software Delivery
GAO
CYBERSECURITY PROGRAM AUDIT GUIDE
SIMPLILEARN
DevOps Interview Guide
Apress
Demystifying Intelligent Multimode Security Systems An SystemsAn Edge-to-Cloud Cybersecurity Solutions Guide
PWC
Data Privacy Handbook
Gavin Phillips
The Deep andDark Web GuideSafely Explore The Hidden Internet
CERT-EU
DDoS Overview and Response Guide
HANIM EKEN
DATA_SECURITY_AUDIT_CHECKLIST
IGNITE Technologies
Data Exfiltration Cheat Sheet
iSMG
CybersecurityPulse Report – From AI to Zero Trust: A Comprehensive Guide to The Key Themes...
CRC Press
Data Privacy for the Smart Grid
New York State
Cybersecurity Program Template A resource to help individual licensees and individually owned businesses develop a...
NCSC
Cybersecurity_Political_Organisations_Election_Candidates
Lockton
Cyber Technology Practice Playbook Part I: Common Adversary Attacks – A practical guide for executives...
Apress
Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security
CREST
Cyber Security Monitoring and Logging Guide
CyberJA
ASSET IDENTIFICATION & CLASSIFICATION-A CRITICAL COMPONENT OF CYBER RISK MANAGEMENT
CLAROTY
Cyber Physical Systems CPS Security
SOSAFE
CybercrimeTrends 2024 The latest threats and security best practices
CREST
Cyber Threat Intelligence Guide – What Is Cyber Threat Intelligence and How Is It Used?
Routledge
Cyber Security Politics Socio-Technological Transformations and Political Fragmentation
Hidaia Mahmood Alassouli
Common Windows, Linux and Web Server SystemsHacking Techniques
Cigref
Surviving a Massive cyber-attack by Cigref
CYFIRMA
Sync Scheduler Stealer
Splunk
SPLUNK® AND THE CIS CRITICALSECURITY CONTROLS Mapping Splunk Software to the CIS 20 CSC Version...
IGNITE Technologies
SSH Penetration Testing Port_22
HADESS
Source Code Analysis Scenarios
SOC SIEM Use Cases
OWASP
SOC -Security Operations Centre Framework Project
safecode
Six Pillars of DevSecOps- Collaboration and Integration
Aristeidis Michail
SOC a Business Perspective
SentineOne
WatchTower I ntelligence-Driven Threat Hunting
Edgar Vega Briceño
SEGURIDAD DE LA INFORMACION
CNIL
Security of Personal Data
Sechard
Security Configuration Management (SCM)
OPSWAP
Securing ICS SCADA updates OT Environments
DevSecOps Guide
Secure Coding Cheatsheets
HADESS
EVENT CODES for fun & profit
Top 300 Azure Sentinel Used Cases KQL (Kusto Query Language) queries
TRAVARSA
Top100 Cyber Threats
WITH SECURE
Threat Landscape Update Report
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
ThreatRadar
Threat Intel Roundup
CSA
The Six Pillars of DevSecOps
Mihaela Curcă
The Role of Cyber Espionage inInternational Relations
CISO2CISO Editors' Picks
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American...
Splunk
81 Siem Very important Use Cases for your SOC...
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals...
OCCUPYTHEWEB
Linux Basics for Hackers by Occupytheweb
Fastercapital.com
How To Launch A Successful B2B Managed Security Services...
help net security
Compliance does not equal security !!
CISO Forum
CISO’s – First 100 Days Roadmap – Your success...
FIRE EYE
The Cyber Risk Playbook – What boards of directors...
Ciso Council
CISO Security Officer Handbook
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
Delinea
The Impact of Business Alignment on Cybersecurity Effectiveness –...
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats...
WILEY
Cybercrime Investigators Handbook by WILEY
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting...
Elevate Security
High Risk Users and Where to Fin Them by...
SALT
State of the CISO – a global report on...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center)...
CYBER LEADERSHIP INTITUTE
CISO PLAYBOOK – Protecting The Crown Jewels by Cyber...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to...
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American...
Marcos Jaimovich
Cyber Threat “Info Stealer” explained in Simple way: A...
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en...
Microsoft
Microsoft Zero Trust Maturity Model
IBM Security
How much does a data breach cost in 2022?...
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course...
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos –...
Apress
Jump-start Your SOC Analyst Career – A Roadmap to...
IZZMIER
Incident Response Playbooks & Workflows Ready for use in...
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian...
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building...
ACSC Australia
Personal Cyber Security First Steps by Australian Government –...
Latest Published Posts
MITRE ATT&CK
Multi-Source Analysis of Top MITRE ATT&CK® TECHNIQUES
GLOBAL NETWORK OF DIRECTOR INSTITUTES
THE FUTURE OF BOARD GOVERNANCE
checkmarx
The Future of APPLICATION SECURITY
Deloitte
The CISO’s Guide to Generative AI
BPC
The Anatomy of the New Fraudster
Capgemini
PROMPT THE FUTURE
Google
We’re All in this Together
cisco
Designing IPSec VPNs with Firepower Threat Defense integration for Scale and High Availability
CyberSN
U.S. Cybersecurity Job Posting Data Report
UNITED STATES CYBER FORCE
United States Cyber Force – A Defense Imperative
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
McKinsey & Company
Transforming risk efficiency and effectiveness
CLOUDSEK
Webwyrm
Arnold Antoo
Zero Trust Security Model
SYNGRESS
Zero-Day Exploit
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Windows
WINDOWS FORENSICS
Joas A Santos
Windows API for Red Team #101
Hacking Articles
PRIVILEGE ESCALATION AUTOMATED SCRIPT LINUX & WINDOWS
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
IGNITE Technologies
Wireless Penetration Testing
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
LSU INFORMATION TECHNOLOGY SERVICES
Basic Shell Scripting
SECUREB4
Brute Force Attacks
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING NODE.JS APPLICATIONS WITH SECURITY CODING PRACTICE
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING AZURE WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
LSU INFORMATION TECHNOLOGY SERVICES
Basic Shell Scripting
SECUREB4
Brute Force Attacks
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING NODE.JS APPLICATIONS WITH SECURITY CODING PRACTICE
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING AZURE WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
IGNITE Technologies
COMPREHENSIVE GUIDE ON TSHARK
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
HADESS
25 Methods for pipeline attacks
Andrey Prozorov
24 Great Cybersecurity Frameworks
PDPC
ADVISORY GUIDELINES ON THE PDPA FOR CHILDREN’S PERSONAL DATA IN THE DIGITAL ENVIRONMENT
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
White Label Consultancy
Data protection and cyber security in 2024
DATA LOSS PREVENTION (DLP)
DARKTRACE
STATE OF AI CYBER SECURITY
AICSSolutions
Cybersecurity Red Team
CERT-EU
Cybersecurity mitigation measures against critical threats
cisco
Cyber Incident Response
ENISA
Baseline Security Recommendations for IoT
HANIM EKEN
Cybersecurity Jobs: Roles, Responsibilities, and Certifications
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
NCSC
Cyber Vitals Checklist V1.0
Users Most Viewed Posts
CISO2CISO Notepad Series
“CISO Mind Map”, an interesting approach to talk about cyber & CISOs responsibilities in our...
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
NCSC
Guidance for Reducing data exfiltration by malicious insiders by National Cyber Security Centre (NCSC)
Practical DevSecOps
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem like a...
Bitdefender
Anatomy of an Industrial espionage operation by Bitdefender
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware Business Impact...
Uendi Hoxha
Top 10 Open Source Security Testing Tools for Pentesters by Uendi Hoxha
SentinelOne
On the Board of Directors ? Beware of these 6 common Cybersecurity Myths by SentinelOne
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
Splunk
The Transformational CISOs Guide to Security Orchestration, Automation and Response – How giving security teams...
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
Paul Agbabian
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
CRS Report Services
The Metaverse – Concepts and Issues for Congress by Congressional Research Service
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
IST RANSOM TASKFORCE
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
DRAGOS
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU...
CLAROTY TEAM 82 RESEARCH
EVIL PLC ATTACK – WEAPONIZING PLCS By Team82, Claroty Research Team
FBI
FBI – 2021 Internet Crime Report
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the age by...
CISA
Cloud Security Technical Reference Architecture
The Hacker News
Cybersecurity CISOs priorities in 2021: focus and return to the basics
TOP Featured POSTS
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
RedHat
State of Kubernetes Security Report 2022 by RedHat
@ANHKWAR
The Most Complete RED TEAM & PENTEST Reference and Resources Guide by @ANHKWAR
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
MANDIANT
M-TRENDS 2022 Mandiant Special Report
SIMPLILEARN
Cloud Computing In 6 Minutes | What Is Cloud Computing? | Cloud Computing Explained |...
Cencys
2022 State of the internet report by cencys
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
WILEY
Cybercrime Investigators Handbook by WILEY
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
Unbound Security
The Cybersecurity Acronym Book
HEIDRICK & STRUGGLES
2022 Global Chief Information Security Officer (CISO) Survey by HEIDRICK & STRUGGLES – SPECIALITY PRACTICES...
Interpol
GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS BY INTERPOL
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
Matteo Meucci and Andrew Muller
OWASP Testing Guide 4.0 by Matteo Meucci and Andrew Muller
RIT
Guide to Risk Assessment and Response by RIT
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special Publication 800-181
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
MALTEGO
Maltego handbook for Incident Response
Views: 4427