This investigation started with the author of this paper sitting down to order a book on Amazon.com. While reading the reviews of that book, he noticed...
Day: November 1, 2023
Private Eyes OSINT
The People’s Liberation Army (PLA) is using new collection, processing, and analysis technologies to exploit the massive amount of open-source information1 available from the internet and...
A Practical Guide for OSINT Investigators to Combat Disinformation and Fake Reviews Driven by AI (ChatGPT) by ShadowDragon
The internet is being flooded with disinformation and fake reviews, generated by users of AI tools such as ChatGPT, with malicious intent. In this report based...
WEF cyber resilience tools
Cyber resilience and cyber risk management are critical challenges for most organizations today. Leaders increasingly recognize that the profound reputational and existential nature of these risks...
Operational Resilience Security Risk Management CISO
Chief Information Security Officers (CISOs)are under increasing pressure to deliver information security strategies that defend their organisations from a continuously changing threat landscape. A robust information...
Cyber Resilience Via Cyber Insurance
OPENINGIn today’s digital economy, cyber attacks represent an ever-present and evolving threat for businesses across all sectors and of all sizes. Cyber risks are as much...
Cyber Resilience via Cyber Insurance
In today’s digital economy, cyber attacks represent an ever-present and evolving threat for businesses across all sectors and of all sizes. Cyber risks are as much...
Advancing Cyber Resilience Principles and Tools for Boards by World Economic Forum (WEF)
Future of Digital Economy and Society System Initiative In collaboration with The Boston Consulting Group and Hewlett Packard Enterprise Preface Cyber resilience and cyber risk management...
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by BlackBerry Cybersecurity.
INTRODUCTION At BlackBerry, we recognize that in today’s world, security leaders must expand their focus beyond technologies and their vulnerabilities. To effectively manage risk, security leaders...
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
Cyber resilience is a concept that describes the ability to continue business operations with little or no downtime—despite experiencing events that present challenges to your information...
Accelerate Compliance with the NSA Methodology for Adversary Obstruction
What is it? The Methodology for Adversary Obstruction is a set of security implementation guidelines introduced by the National Security Agency with the ultimate goal of...
Microsoft Azure Compliance Offerings
Abstract This document provides an overview of Microsoft Azure compliance offerings intended to help customers meet their own compliance obligations across regulated industries and markets worldwide....
DLP Data Protection Compliance
Data leaks are a serious problem for organizations every-where and stealing very sensitive information is, all too often, as easy as copying data to a USB...
Building a Cybersecurity and Privacy Learning Program
This publication provides guidance for federal agencies and organizations to develop and manage a lifecycle approach to building a cybersecurity and privacy learning program (hereafter referred...
Data Privacy Salary Survey PDF
We are specialists within our niche areas of technology recruitment with a lasting reputation for delivery for our clients and candidates in both permanent and contract...
Cybersecurity and Privacy Annual Report
Nelson Mandela famously said, “Remember to celebrate milestones as you prepare for the road ahead.”This year, we celebrated a major milestone that we’re proud of: 50...
Cybersecurity Tips to Secure Your Privacy in 2023
In 2023, ensuring your privacy and protecting yourself from online threats is crucial. Here are some key cybersecurity tips: SET UP TWO -FACTOR AUTHENTICATION: Enable two-factor...
Generative AI and Data Privacy A Primer
Since the public release of Open AI’s ChatGPT, Google’s Bard, and other similar systems, some Members of Congress have expressed interest in the risks associated with...
BSI-Standard 200-1
Today, the increasing digitalisation and networking of the work environment presents companies and government agencies with fundamental challenges. Likewise, the basic threat situation for information security...
Office 365 Secure Configuration Framework
The National Cyber Security Centre (NCSC), in coordination with Microsoft and Ekco, have developed this Secure Configuration Framework for Office 365 a component of the Microsoft...
The NIST Cybersecurity Framework 2.0
Cybersecurity risks are a fundamental type of risk for all organizations to manage. Potential impacts to organizations from cybersecurity risks include higher costs, lower revenue, reputational...
SANS – Cloud Security Foundations, Frameworks, and Beyond – In partnership with aws , Google Cloud and Microsoft
Forward Multicloud is a reality for organizations of all sizes. As a result, security leaders need to build capabilities and expertise for any cloud provider that...
Cybersecurity Frameworks
What isaCyber SecurityFramework? These documents describe guidelines, standards, and best practices for cyber security risk management. These frameworks reduce an organization’s exposure to weaknesses and vulnerabilities...
A multilayer framework for cybersecurity practices for AI
In April 2021, the European Commission published a proposal for an artificial intelligence (AI) regulation (1). The proposal focuses on high-risk AI systems, for which requirements...
Developer´s Guide to OWASP – Top 10 API Security vulnerabilities & MITRE ATT&ACK framework relation – Go Lang Edition by Farshid Mahdavipour , Kumar Chandramoulie , Joe Vadakkan
Authors: Farshid Mahdavipour , Kumar Chandramoulie , Joe Vadakkan Introduction The OWASP API Security Top 10 is a list of the most common and critical risks...
Threat Hunting Framework by Cyborg Security
INTRODUCTION “HUNTING IS NOT A SPORT. IN A SPORT, BOTH SIDES SHOULD KNOW THEY’RE IN THE GAME.” ‘Threat hunting’ is a concept that has gained tremendous...
Cybersecurity Measures For Your Business
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation’s critical assets. Section 6...
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
FEATURING INSIGHTS FROM DIGITAL ASSETS AND DATA MANAGEMENT GROUP TEAMS We are now three years post pandemic, and while a lot has changed, some things remain...
TOP 10 Cybersecurity Posture Metrics every CISO should use – A CISO Executive Guide by Balbix
Cybersecurity Posture Metrics Matter More Than Ever. You can´t improve what you can´t measure. Metrics and modern cybersecurity are intrinsically linked. CISOs use metrics to determine...
M Trends 2023 Mandiant
In 2022, Mandiant observed a general increase in the number of organizations that were alerted by an external entity of historic or ongoing compromise. Organizations were...





























