Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST NEWS
07
/
26
:
10:00 am
:
UK Blood Stocks Drop After Ransomware Hack – Source: www.databreachtoday.com
07
/
26
:
10:00 am
:
Proof of Concept: How Can We Outpace Deepfake Threats? – Source: www.databreachtoday.com
07
/
26
:
10:00 am
:
Chainguard Raises $140M to Drive AI Support, Global Growth – Source: www.databreachtoday.com
07
/
26
:
10:00 am
:
Cybercrooks Continue to Capitalize on CrowdStrike Outage – Source: www.databreachtoday.com
07
/
26
:
10:00 am
:
Live Webinar | AI-Driven Endpoint Security: Adapting to Industry Changes – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
Mandiant: North Korean Hackers Targeting Healthcare, Energy – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
Vulnerabilities in LangChain Gen AI Could Prompt Data Leak – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
Senator: Top Banks Only Reimburse 38% of Unauthorized Claims – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
Check Point Snags Team8’s Nadav Zafrir to Replace Gil Shwed – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
How to Lead When a Crisis Occurs – Source: www.databreachtoday.com
07
/
25
:
10:00 am
:
Time to Rethink Identity: What Security Leaders Need to Know – Source: www.databreachtoday.com
07
/
24
:
10:00 am
:
CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage – Source: www.databreachtoday.com
07
/
24
:
10:00 am
:
Hackers Froze Ukrainian Heating Systems in Winter – Source: www.databreachtoday.com
07
/
24
:
10:00 am
:
Proactive Network Security: Lessons From CrowdStrike Outage – Source: www.databreachtoday.com
07
/
24
:
10:00 am
:
Report: HHS Needs to Beef Up Cloud Security and Skills – Source: www.databreachtoday.com
07
/
23
:
10:01 am
:
Chinese Cyberespionage Group Expands Malware Arsenal – Source: www.databreachtoday.com
07
/
23
:
10:01 am
:
CrowdStrike’s Response to Outage Will Minimize Lost Business – Source: www.databreachtoday.com
07
/
23
:
10:00 am
:
E-Prescription Vendor Breach Affects 12.9 Million Aussies – Source: www.databreachtoday.com
07
/
23
:
10:00 am
:
CrowdStrike Disruption Restoration Is Taking Time – Source: www.databreachtoday.com
07
/
22
:
10:00 am
:
Microsoft Sees 8.5M Systems Hit by Faulty CrowdStrike Update – Source: www.databreachtoday.com
CISO STRATEGICS
CYBER ARCHITECTURE
SOC CSIRT OPERATIONS
CYBERSECURITY TOOLS
CYBERSECURITY VENDORS
CYBERSECURITY MSSP
CYBER ORGANIZATIONS
CYBER REGULATIONS
EVENTS & CONFERENCES
VULNs & ZERO DAYS
Latest Published Posts
Marcos Jaimovich
CISO: The Jedi Master of Cybersecurity. Take Off Strong in Your First 100 Days! Detailed...
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Sectrio
The Global OT & IoT Threat Landscape Assessment and Analysis rEPORT 2024 by Sectrio Threat...
Marcos Jaimovich
Remember: Compliance is a checkbox, Real Cybersecurity is a journey.
Google
We’re All in this Together
cisco
Designing IPSec VPNs with Firepower Threat Defense integration for Scale and High Availability
CyberSN
U.S. Cybersecurity Job Posting Data Report
UNITED STATES CYBER FORCE
United States Cyber Force – A Defense Imperative
CISA | Cybersecurity and Infrastructure Security Agency
UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
LATEST CYBER NEWS
Data Breach Today
UK Blood Stocks Drop After Ransomware Hack – Source: www.databreachtoday.com
Data Breach Today
Proof of Concept: How Can We Outpace Deepfake Threats? – Source: www.databreachtoday.com
Data Breach Today
Chainguard Raises $140M to Drive AI Support, Global Growth – Source: www.databreachtoday.com
Data Breach Today
Cybercrooks Continue to Capitalize on CrowdStrike Outage – Source: www.databreachtoday.com
Data Breach Today
Live Webinar | AI-Driven Endpoint Security: Adapting to Industry Changes – Source: www.databreachtoday.com
Data Breach Today
Mandiant: North Korean Hackers Targeting Healthcare, Energy – Source: www.databreachtoday.com
Data Breach Today
Vulnerabilities in LangChain Gen AI Could Prompt Data Leak – Source: www.databreachtoday.com
Data Breach Today
Senator: Top Banks Only Reimburse 38% of Unauthorized Claims – Source: www.databreachtoday.com
Data Breach Today
Check Point Snags Team8’s Nadav Zafrir to Replace Gil Shwed – Source: www.databreachtoday.com
Data Breach Today
How to Lead When a Crisis Occurs – Source: www.databreachtoday.com
Data Breach Today
Time to Rethink Identity: What Security Leaders Need to Know – Source: www.databreachtoday.com
Data Breach Today
CrowdStrike Says Code-Testing Bugs Failed to Prevent Outage – Source: www.databreachtoday.com
CISO2CISO Editors' Picks
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course...
SALT
State of the CISO – a global report on...
Ciso Council
CISO Security Officer Handbook
Feedspot.com
146 Best Cyber Security Blogs and Websites by Feedspot.com
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No...
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational...
Apress
Jump-start Your SOC Analyst Career – A Roadmap to...
HADESS
Introduction to Doxing- OSINT methods for information gathering by...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals...
help net security
Compliance does not equal security !!
ACSC Australia
Personal Cyber Security First Steps by Australian Government –...
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center)...
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course...
CISO2CISO Notepad Series
The sqreen DevSecOps Security Checklist
LOGPOINT
396 Use Cases & Siem Rules Code ready for...
CISO
STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Osint - Humint
Privacy
Risk & Compliance
Resilience
Social Engineering
Supply Chain Security
CYBER
ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
IOT Security
MAC-OS Security
Metaverse Security
Micro segmentation
Mitre Att&ck
Mobile & 5G Security
Network Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT
OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Malware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY
TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBER
ORGs
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
NSA
NIST Security
SANS
WEF
CYBER
ATTACKS
Cyber Incidents & Attacks Notepad
Data Leak & Breach Incidents Notepad
Crypto theft , stealing & attacks
DDOS Attacks
Mallware & Ransomware
Phising Attacks
Social Engineering
Supply Chain Attacks
BEC
CYBER
CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
CYBER
REGULATIONS
PCI - DSS
ISO 27001
SOX
Latest Published Posts
McKinsey & Company
Transforming risk efficiency and effectiveness
CLOUDSEK
Webwyrm
Arnold Antoo
Zero Trust Security Model
SYNGRESS
Zero-Day Exploit
Richea Perry
Your Cybersecurity Toolkit
IGNITE Technologies
Wireless Penetration Testing
Windows
WINDOWS FORENSICS
Joas A Santos
Windows API for Red Team #101
Hacking Articles
PRIVILEGE ESCALATION AUTOMATED SCRIPT LINUX & WINDOWS
Economic Research Working Paper
Artificial Intelligence and Intellectual Property
IGNITE Technologies
Wireless Penetration Testing
CASOS DE USO APLICABLES EN UN SIEM
IGNITE Technologies
Burp Suite for Pentester
LSU INFORMATION TECHNOLOGY SERVICES
Basic Shell Scripting
SECUREB4
Brute Force Attacks
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING PHP APPLICATIONS
CYBERSECURITY
VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY
MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CISO2CISO Editors' Picks
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP –...
Splunk
81 Siem Very important Use Cases for your SOC...
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or...
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building...
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en...
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS...
ACSC Australia
Personal Cyber Security First Steps by Australian Government –...
Gartner
A CISOs Guide for Conversations with the CFO by...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for...
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational...
LATEST CYBER NEWS
Data Breach Today
Hackers Froze Ukrainian Heating Systems in Winter – Source: www.databreachtoday.com
Data Breach Today
Proactive Network Security: Lessons From CrowdStrike Outage – Source: www.databreachtoday.com
Data Breach Today
Report: HHS Needs to Beef Up Cloud Security and Skills – Source: www.databreachtoday.com
Data Breach Today
Chinese Cyberespionage Group Expands Malware Arsenal – Source: www.databreachtoday.com
Data Breach Today
CrowdStrike’s Response to Outage Will Minimize Lost Business – Source: www.databreachtoday.com
Data Breach Today
E-Prescription Vendor Breach Affects 12.9 Million Aussies – Source: www.databreachtoday.com
Data Breach Today
CrowdStrike Disruption Restoration Is Taking Time – Source: www.databreachtoday.com
Data Breach Today
Microsoft Sees 8.5M Systems Hit by Faulty CrowdStrike Update – Source: www.databreachtoday.com
Data Breach Today
Fake Websites, Phishing Surface in Wake CrowdStrike Outage – Source: www.databreachtoday.com
Data Breach Today
ISMG Editors: What the CrowdStrike Outage Taught Us So Far – Source: www.databreachtoday.com
Data Breach Today
CrowdStrike/Microsoft Outage Latest Blow to Healthcare – Source: www.databreachtoday.com
Data Breach Today
Federal Agencies Scramble to Fix Massive Software Outage – Source: www.databreachtoday.com
Latest Published Posts
LSU INFORMATION TECHNOLOGY SERVICES
Basic Shell Scripting
SECUREB4
Brute Force Attacks
The Institute of Internal auditors
Auditing Risk Culture
DevSecOps Guide
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING PHP APPLICATIONS
DevSecOps Guide
ATTACKING NODE.JS APPLICATIONS WITH SECURITY CODING PRACTICE
DevSecOps Guide
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
DevSecOps Guide
ATTACKING AZURE WITH SECURITY BEST PRACTICE
CLTC WHITE PAPER SERIES
Guidance for the Development of AI Risk and Impact Assessments
Active Directory
Active Directory IT AuditChecklist
A guide to business continuity planning
LOG RHYTHM
Using MITRE ATT&CK™ in Threat Huntingand Detection
IGNITE Technologies
COMPREHENSIVE GUIDE ON TSHARK
Kaspersky
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
HADESS
25 Methods for pipeline attacks
Andrey Prozorov
24 Great Cybersecurity Frameworks
PDPC
ADVISORY GUIDELINES ON THE PDPA FOR CHILDREN’S PERSONAL DATA IN THE DIGITAL ENVIRONMENT
ENISA-EUROPA
SEGURIDAD DE TELECOMUNICACIONES
Project Management Institute
Building Resilience Through Strategic Risk Management
White Label Consultancy
Data protection and cyber security in 2024
DATA LOSS PREVENTION (DLP)
DARKTRACE
STATE OF AI CYBER SECURITY
AICSSolutions
Cybersecurity Red Team
CERT-EU
Cybersecurity mitigation measures against critical threats
cisco
Cyber Incident Response
ENISA
Baseline Security Recommendations for IoT
HANIM EKEN
Cybersecurity Jobs: Roles, Responsibilities, and Certifications
CSR Cyber Security Council
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
SYBEX
Cybersecurity ESSENTIALS
NCSC
Cyber Vitals Checklist V1.0
Agency for Digital Government
Cyber security in supplier relation ships
CYBER4PEAPLE
Cybersecurity Is All About People
RINKU
Curso de introducción KALI LINUX PARA HACKERS ÉTICOS
SG CYBER SAFE
CYBERSECURITY TOOLKIT
CNIL
PRACTICE GUIDE GDPR
CSR Cyber Security Council
CYBERSECURITY GUIDE FOR BOARD ROOM MEMBERS
Australian Government
Enhanced CyberSecurity Obligations
FERMA
THE ROADMAP TO STRATEGIC RISK MANAGEMENT
UNITES STATES CYBER FORCE
United States Cyber Force A Defense Imperative
ENISA-EUROPA
Cyber Resilience Act Requirements Standards Mapping
SYNGRESS
Essential Skills for Hackers
CYTAD
Essential Data Privacy Checklist
SF-ISAC
Digital Operational Resilience Act
Deloitte
Enterprise compliance The Risk Intelligent approach
IGNITE Technologies
Docker Architecture
SYNGRESS
DIGITAL FORENSICS WITH Open Source TOOLS
ABB
Differentiation of the IT security standard series ISO 27000 and IEC 62443
IT REVOLUTION DEVOPS ENTERPRISE FORUM
DevOps Automated Governance Reference Architecture
Detecting Brute Force Attacks
SANS GIAC CERTIFICATIONS
Detecting Attacks on Web Applications from Log Files
UpGuard
DORA Assessment Workbook
EUROPEAN DATA PROTECTION SUPERVISOR
ANNUAL REPORT 2023
TechTarget
IT Disaster Recovery Plan Template
IGNITE Technologies
JENKINS PENTESTING
Opstune
IOC Scan Framework v2.0
KPMG
Internal audit — Trusted and disrupted
The Offensive labs
HACKING AND SECURING DOCKER CONTAINERS
Federal Office for Information Security
Indirect Prompt Injections
CERTIK
HACK3D THE WEB3 SECURITY REPORT 2023
the Department of the Environment Climate and Communications
Guidelines on CyberSecurity Specifications
Homeland Security
Increasing Threat of DEEP FAKE Identities
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
Security METRICS
Security Metrics Guide to PCI DSS Compliance
A-CAP
GUÍA PRÁCTICA DEL GDPR
CISO2CISO Editors' Picks
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian...
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No...
FIRE EYE
The Cyber Risk Playbook – What boards of directors...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for...
Gartner
A CISOs Guide for Conversations with the CFO by...
Ciso Council
CISO Security Officer Handbook
Microsoft
Microsoft Zero Trust Maturity Model
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or...
SentinelOne
90 DAYS A CISO´s Journey to Impact define your...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for...
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats...
Fastercapital.com
How To Launch A Successful B2B Managed Security Services...
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en...
WILEY
Cybercrime Investigators Handbook by WILEY
IZZMIER
Incident Response Playbooks & Workflows Ready for use in...
Marcos Jaimovich
The Silent Spectre Haunting Your Network: QPhishing, the CISO’s...
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center)...
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service...
IBM Security
How much does a data breach cost in 2022?...
Codrut Andrei
Secure Software Development Lifecycle Fundamentals by Codrut Andrei
ACSC Australia
Personal Cyber Security First Steps by Australian Government –...
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success...
SALT
State of the CISO – a global report on...
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos –...
RedHat
State of Kubernetes Security Report 2022 by RedHat
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN...
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have...
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development...
Latest Published Posts
SOC TIPS Cybersecurity
Guia de Resposta a Incidentes de Segurança para LGPD
Thecyphere
Google Cloud Architecture Framework
NACD - Internet Security Alliance
CYBER-RISK OVERSIGHT HANDBOOK FOR CORPORATE BOARDS
CDCP
FIREWALL Audit CHECKLIST
GitGuardian
Secrets Management Maturity Model
IoT Security Institute
Smart Cities & Critical Infrastructure Framework
MegaCorp One
Sample Penetration Test Report
Neurorights
Safeguarding Brain Data: Assessing the Privacy Practices of Consumer Neurotechnology Companies
FORTINET
Routing in FortiGate
CRC Press
Risk and Privacy FREE BOOK
FUTURE OF PRIVACY FORUM
Risk Framework Body Related Data (PD) Immersive Tech
GAO
CYBERSECURITY Improvements Needed in Addressing Risks to Operational Technology
ENISA
Remote ID Proofing Good Practices
HADESS
RedTeam Tips Orchestrating Chaos Evading Defense Culture
Google
Why Red TeamsPlay a Central Rolein Helping OrganizationsSecure AI Systems
PICUS
Red Report 2024 – The Top 10 Most Prevalent MITRE ATT&CK® Techniques The Rise of...
Red Canary
Threat Detection Report 2024
ISACA
Recommended Skills for a Cyber Security Career
Marine Pichon
Ransomware Cartography (2014-2024)
HADESS
Pwning the Domain Persistence
SANS
Purple Concepts Bridging the Gap
Australian Goverment
PROTECTIVE SECURITYPOLICY FRAMEWORKSecuring government business:Protective security guidance for executive
CISC (Comité Internacional Sobre Ciberseguridad)
Política Nacional de Ciberseguridad 2023-2028
Michael Tchuindjang
Phishing Attack Pentesting Guide
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
IPA
Practical Examples ofSecurity Risk Assessmentfor Industrial Control Systems
NCSC
Office 365 Secure Confirmation Framework
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA...
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
FUTURE OF PRIVACY FORUM
Generative AI for Organizational Use:Internal Policy Checklist
ENISA
Best Practices for Cyber Crisis Management
Center for Internet Security
A Guide to Defining Reasonable Cybersecurity
Google
Perspectiveson Securityfor the Board
HADESS
OSINT Method for Map Investigations
IPA
Practical Examples ofSecurity Risk Assessmentfor Industrial Control Systems
NCSC
Office 365 Secure Confirmation Framework
CCN-CERT
Observatorio Riesgos Ciberseguridad 2024
CYBERTHEORY
The ISMG Cybersecurity Pulse Report 2024 is a treasure trove of insights from the RSA...
FORTINET
Bloking Malware Through Antivirus Security Profile in FortiGate
FUTURE OF PRIVACY FORUM
Generative AI for Organizational Use:Internal Policy Checklist
ENISA
Best Practices for Cyber Crisis Management
Center for Internet Security
A Guide to Defining Reasonable Cybersecurity
viehgroup
AWS Cloud Security Checklist
aws
AWS Blueprint for Ransomware Defense
DevSecOps Guide
Attacking .NET
U.S. Department of Homeland Security
MITIGATING ARTIFICIAL INTELLIGENCE (AI) RISK: Safety and Security Guidelinesfor Critical Infrastructure Ownersand Operators
IGNITE Technologies
Advance Burp Suite Pentester Training (Online)
Gobierno de España
Informe Anual de Seguridad Nacional 2023
LogRhythm
Using MITRE ATT&CK™in Threat Huntingand Detection
NCSC
NIS 2A Quick Reference Guide
INCIDENT RESPONSE PLAN
ISO 27001:2022
INCIDENT REPORTING TEMPLATE
NIST CSF 2.0
Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Microsoft Security
From plan to deployment: Implementing a cloud-native application protection platform(CNAPP) strategy
GmFaruk
Identity and Access Management Policy
NIST
Artificial Intelligence Risk Management Framework
UK HM Government
National Cyber Strategy 2022
ISO 27701
Ley Marco de Ciberseguridad e Infraestructura Crítica de la Información
HADESS
MALWARE DEVELOPMENT EVADING DIARIES
HADESS
MALWARE DEVELOPMENT PROCESS DIARIES
NSA
NSA Network Infrastructure Security Guide
NIST
NIST SP 800 Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Users Most Viewed Posts
OWASP
Web Security Testing Guide by OWASP
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
HEIDRICK & STRUGGLES
2022 Global Chief Information Security Officer (CISO) Survey by HEIDRICK & STRUGGLES – SPECIALITY PRACTICES...
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
KPMG
Adopting secure DevOps – An introduction to transforming your organization by KPMG
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
CYBEREDGE PRESS
The Threath Intelligence Handbook – Moving Toward a Security Intelligence Program by Zane Pokorny
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis by Checkpoint.
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
Bitdefender
Anatomy of an Industrial espionage operation by Bitdefender
vmware
Global Incident Response Threat Report 2022 by vmware
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
ENISA-EUROPA
European Cybersecurity Skills Framework by ENISA & European Union Agency for Cybersecurity. Note: If you...
FBI
FBI – 2021 Internet Crime Report
COMPASS SECURITY
Hacking Tools Cheat Sheet by Compass Security
DRAGOS
ASSESSING OPERATIONAL TECHNOLOGY (OT) CYBERSECURITY MODEL – AN ANALYSIS OF LEASED DATACENTERS UTILIZING THE CYBERSECURITY...
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
Michael Schearer
Shodan for Penetration Testers
Wallarm
API Security: a 10-year Retrospective by Ivan Wallarm
Renee Tarun y Susan Burg
CIBER SEGURO – Una guía perruna sobre seguridad en Internet para niños y adultos “todos...
Bitdefender
Anatomy of an Industrial espionage operation by Bitdefender
veeam
2022 VEEAM Ransomware Trends Report
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the age by...
WILEY
Mitre Attack for Dummies
TOP Featured POSTS
Marcos Jaimovich
Goodbye to Traditional: Why Conventional Cybersecurity Tools are No Longer Sufficient for the Future of...
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
ONAPSIS
Five Ways to Secure SAP S/4 HANA Migrations by ONAPSIS
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
CAREER UP
7 Steps to your Cybersecurity Career – How to begin your career in Cibersecurity By...
NHTSA
Cybersecurity Best Practices for the Safety of Modern Vehicles – Updatd 2022 by NHTSA
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
Ben McCarty - No Start Press
Cyberjutsu – Cybersecurity for the Modern Ninja by Ben McCarty
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
rpi
THE IoT LANDSCAPE – The next decade of the Internet of Things by rpi –...
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
infosecn1nja
Active Directory Kill Chain – Attack and defend active directory using modern post exploitation adversary...
HONEYWELL FORGE
Industrial Cybersecurity USB Threath Report 2022 – Threats designed for USB exploitation rise to 52%....
KPMG
Adopting secure DevOps – An introduction to transforming your organization by KPMG
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access, lack of...
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai – Matej Havranek...
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Cyber Rescue Alliance
The Best Cyber Insights of 2022 by The Cyber Rescue Alliance
World Economic Forum
The Zero Trust Model in Cybersecurity – Towards undesstanding and deployment – Community Paper –...
offs.ec
PEN-200 and the OSCP prep book by offs.ec
snyk
The State of Cloud Security Report 2022 – A report on the cloud risks and...
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar (PCI DSS)...
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
Microsoft Security
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of October 11th,...
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
MALTEGO
Maltego handbook for Incident Response
Views: 2082