Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Last Article Publication
Last Article Publication
UK HM Government
UK Government Cyber Security Strategy – Building a Cyber resilient public sector by HM Government
IST RANSOM TASKFORCE
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
U.S. Embassy Suva
Cybersecurity Open Source Tools
Microsoft & CyberProof
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
OAS & GLOBAL PARTNERS
National Cybersecurity Strategies – Lessons Learned and Reflections from the Americas and Other Regions by...
LUMU
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
GFCE
Developing Cyber Security as a Profession – A report by the Global Forum on Cyber...
CISO2CISO.COM
SOC Analyst Interview Questions
HUY KHA
Microsoft Active Directory – Security Self Assesment Guide 2022 by Huy Kha
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
National Cyber Security Centre
Joint Ventures in the Construction Sector – Information Security Best Practice Guidance by National Cyber...
DRAGOS
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU...
ALLIANZ
A Guide to Cyber Risk – Managing the Impact of Increasing Interconnectivity by Allianz
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
Boston Consulting Group
Turning a Cybersecurity Strategy Into Reality – A Holistic Performance Management Framework by Boston Consulting...
CISSPWOMEN.COM
Introducing to Pueple Teaming – Some Attacks and Detects Methods by Saeedeh Zeinali
CLOUDFLARE
Common browser isolation challenges, and how to overcome them – The intersection of Internet browsing...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
SYSDIG
Kubernetes Security Guide by Sysdig
CSH CYBER SECURITY HUB
The state of Cloud configuration security practices by Olivia Powel – CSHUB – Find out...
CardinalOps
The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK...
ipsos
Exploring Organisational Experiences of Cyber Security Breaches Report by IPSOS
GOLDPHISH
FIVE COMMON TYPES OF PHISHING – EMAIL PHISHING , CLONE PHISHING , WHALING, SPEARPHISHING ,...
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
SIEMPLIFY
The Art of Recognizing and Surviving SOC Burnout – A complete Manual for Security Operations...
NIST
Guide to a Secure Enterprise Network Landscape NIST SP 800-215
QUANTINUUM
The CISOs Guide to Post-Quantum Standarization by QUANTINUUM
expel
MITRE ATT&CK in Google Cloud Platform (GCP) – A defender’s cheat sheet by expel
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
Posts navigation
1
2
…
4
Latest Cyber News
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024
The Register Security
Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op – Source: go.theregister.com
18/04/2024
The Register Security
Cisco creates architecture to improve security and sell you new switches – Source: go.theregister.com
18/04/2024
The Register Security
Singapore infosec boss warns China/West tech split will be bad for interoperability – Source: go.theregister.com
18/04/2024
The Hacker News
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade – Source:thehackernews.com
18/04/2024
The Hacker News
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor – Source:thehackernews.com
18/04/2024
The Hacker News
Recover from Ransomware in 5 Minutes—We will Teach You How! – Source:thehackernews.com
18/04/2024
The Hacker News
How to Conduct Advanced Static Analysis in a Malware Sandbox – Source:thehackernews.com
18/04/2024
The Hacker News
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks – Source:thehackernews.com
18/04/2024