The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Author: Lucas Coletta
ATTACKING SUPPLY CHAIN WITH SECURITY BEST PRACTICE
In today’s rapidly evolving technological landscape, DevOps practices have transformed software development and deployment by emphasizing collaboration, automation, and continuous integration/continuous deployment (CI/CD). However, the interconnected...
ATTACKING PHP APPLICATIONS
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
ATTACKING NODE.JS APPLICATIONS WITH SECURITY CODING PRACTICE
The document provides a comprehensive guide on securing Node.js applications by addressing various security vulnerabilities and best practices. It covers topics such as preventing injection attacks,...
ATTACKING KUBERNETES WITH SECURITY BEST PRACTICE
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
ATTACKING AZURE WITH SECURITY BEST PRACTICE
The document outlines the mapping of security controls in Azure to the MITRE ATT&CK framework, primarily based on Microsoft’s Azure Security Benchmark v2. It includes ATT&CK...
Guidance for the Development of AI Risk and Impact Assessments
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Active Directory IT AuditChecklist
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
A guide to business continuity planning
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Using MITRE ATT&CK™ in Threat Huntingand Detection
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
COMPREHENSIVE GUIDE ON TSHARK
In this article, we will learn about TShark which is a well-known network protocol analyser. It lets us capture the data packets, from the live network....
H2 2023 – A brief overviewof main incidentsin industrial cybersecurity
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
25 Methods for pipeline attacks
The document outlines various security practices and tools to enhance the security posture of Continuous Integration/Continuous Deployment (CI/CD) pipelines. It covers the identification and mitigation of...
24 Great Cybersecurity Frameworks
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
ADVISORY GUIDELINES ON THE PDPA FOR CHILDREN’S PERSONAL DATA IN THE DIGITAL ENVIRONMENT
In today’s highly connected world, children start using the Internet at a young age and may not fully grasp the risks, or understand the consequences, of...
SEGURIDAD DE TELECOMUNICACIONES
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Building Resilience Through Strategic Risk Management
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Data protection and cyber security in 2024
2023 was a busy year within the data protection and cyber security domain. The Court of Justice of the European Union (CJEU) rendered 32 judgments related...
DATA LOSS PREVENTION (DLP)
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
STATE OF AI CYBER SECURITY
Keeping up with the latest threats isn’t easy for cyber security professionals. Akin to untying the legendary Gordian knot, stopping waves of unknown threats across every...
Cybersecurity Red Team
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity mitigation measures against critical threats
On February 14, ENISA and CERT-EU made a joint publication strongly encouraging all EUbased organisations to implement a set of cybersecurity best practices. Building on this...
Cyber Incident Response
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Baseline Security Recommendations for IoT
In the context of Critical Information Infrastructures The Internet of Things (IoT) is a growing paradigm with technical, social, and economic significance. For ENISA, IoT is...
Cybersecurity Jobs: Roles, Responsibilities, and Certifications
In the rapidly evolving landscape of cybersecurity, professionals play a crucial role in safeguarding digital assets, networks, and sensitive information. The document outlines various cybersecurity roles,...
EVERY BUSINESS HAS DUTIES OF CARE IN THE FIELD OF CYBER SECURITY
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity ESSENTIALS
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cyber Vitals Checklist V1.0
In today’s fast-paced and dynamic digital environment we can expect to see regular fluctuations in the cyber threat landscape. Organisations should be aware of these changes...
Cyber security in supplier relation ships
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Cybersecurity Is All About People
The document emphasizes the importance of cultivating a strong cybersecurity culture within organizations, going beyond mere awareness. It covers key components essential for fostering a positive...





























