En 2023, la tensión estratégica ha vuelto a ocupar un primer plano. A la guerra iniciada por la invasión rusa de Ucrania en 2022 hay que...
Author: Constanza Rodriguez
Using MITRE ATT&CK™in Threat Huntingand Detection
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
NIS 2A Quick Reference Guide
NIS2 will further enhance the work started in the NIS Directive in building a high common level of cybersecurity across the European Union.It places obligations on...
NSA Network Infrastructure Security Guide
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
NIST SP 800 Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. The six CSF 2.0 Functions play vital roles in...
NIST Policy Template Guide
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
NIST AI_Risk Management Framework Playbook
The Playbook provides suggested actions for achieving the outcomes laid out inthe AI Risk Management Framework (AI RMF) Core (Tables 1 – 4 in AI RMF1.0)....
The Case for ISA/IEC 62443Security Level 2 as a Minimumfor COTS Components
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
2024 State of Multicloud Security Report
The advent of cloud computing ushered in a new ra of innovation, empowering organizations to rapidly scale and embrace new opportunities. Today, multicloud environments have become...
2024 Cyber Threat Report
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
2024 CYBER CLAIMS REPORT
Technology has become ingrained in modern business and so has cyber risk. Cyber risk is now the most significant concern for business leaders globally.1 As a...
2023 Director’s Handbook on Cyber-risk Oversight
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
14 Cybersecurity Trends for 2024
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Balance de Ciberoperaciones_2023
Number of new cyber operations recorded In 2023, the European Repository of Cyber Incidents (EuRepoC) recorded a total of 895 new cyber operations, averaging about 75...
Attacking IOS
In this comprehensive guide, we delve into the world of iOS security from an offensive perspective, shedding light on the various techniques and methodologies used by...
Artificial Intelligence and Cybersecurity Research 2023
Artificial Intelligence (AI) is a typical dual-use technology, where malicious actors and innovators are constantly trying to best each other’s work. This is a common situation...
Android Security Research Book
Android security research plays a major role in the world of cybersecurity that we live in today. As of 2024, Android has a 71.74% global market...
Active Directory Penetration Testing Training Online
Active Directory (AD) is a Microsoft Windows Server-based directory service. Active Directory Domain Services (AD DS) manages directory data storage and makes it accessible to network...
Active Directory Security
Active Directory (AD), introduced with Windows 2000 [1], has become an integral part of modern organizations, serving as the backbone of identity infrastructure for 90% of...
GLOBAL AUTOMOTIVE CYBERSECURITY REPORT
Connectivity is continuing to transform the Automotive and Smart Mobility ecosystem, increasing cybersecurity risks as more functionality is exposed. 2023 marked the beginning of a new...
2024 Cyber Security Report by Checkpoint
Welcome to the Check Point 2024 Cyber Security Report. In 2023, the world of cyber security witnessed significant changes, with the nature and scale of cyber...
2023 Mobile Banking Heists Report
Zimperium’s latest research explores a dynamic and expanding threat landscape by meticulously analyzing 29 banking malware families and associated trojan applications. This year alone, the research...
2023 Internet Crime Report
Today’s cyber landscape is threatened by a multitude of malicious actors who have the tools to conduct large-scale fraud schemes, hold our money and data for...
CSI Cloud Top10 Key Management
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Defining the Zero TrustProtect Surface
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
CONTAINER SECURITY INTERVIEW QUESTIONS ANSWERS
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
PRACTICE GUIDE GDPR – SECURITY OF PERSONAL DATA Version 2024
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cloud Security Engineer Roadmap
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cloud Computing Tutorial Simply Easy Learning
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
CISSP Preparation Notes
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...





























