Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
SOC
SOC
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Akamai
How to Avoid Party Chaos with the Right Application-Layer DDoS Platform whitepaper by Akamai
Akamai
Network Segmentation and Microsegmentation in Moderm Enterprise Environments by Akamai
Lawrence C. Miller
Next Generation Anti-Malware Testing for Dummies – Brought to you by Cylance
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
CROWDSTRIKE
CROWDSTRIKE 2022 Global Threat Report by George Kurtz
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
Info-Tech Research Group
Best vendor agnostic SIEM for SOCs solution implementation guide by Info-Tech Research Group
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
UK NCSC
NCSC CAF guidance – The Cyber Assessment Framework 3.1
CSBS.ORG
CYBERSECURITY 101 – A Resource Guide for Financial Sector Executives by John W. Ryan
IST RANSOM TASKFORCE
Combating Ransomware – A Comprehensive Framework for Action Key Recommendations from the Ransomare Task Force...
CISO2CISO Notepad Series
OWASP Top 10 2021 (DRAFT FOR PEER REVIEW) What´s New!!
World Economic Forum
Building a cyber resilience strategy for a geopolitically unstable world
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
CISO MAG
A day in the life of a modern CISO — You must read…
CYBEREDGE PRESS
The Threat Intelligence Handbook – A Practical Guide for Security Teams to Unlocking the Power...
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
CISA
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
CISO2CISO Notepad Series
A Guide to DevSecOps Tools and Continuous Security For an Enterprise by Navdeep Sing gill
Bastian Ballman - Springer
Undestanding Networks Hacks – Attack and Defense with Python 2nd Edition by Bastian Ballman –...
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
Chris Davis
Blue Team Cheat Sheets by Chris Davis
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
Posts navigation
1
2
3
Latest Cyber News
Data Breach Today
The Critical Role of Effective Onboarding – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Will Cybersecurity Get Its 1st New Unicorn Since June 2022? – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
HHS Resources, Funding to Bolster Healthcare Cyber Efforts – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Building a 911 Cyber Civil Defense System for Healthcare – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
The Concentrated Cyber Risk Posed by Enormous Vendors – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Webinar | Navigating the SEC Rules for Enhanced Cybersecurity in IT and OT Environments –...
14/03/2024
Data Breach Today
Hackers Hiding Keylogger, RAT Malware in SVG Image Files – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
Live Webinar | Navigating Identity Threats: Detection & Response Strategies for Modern Security Challenges – Source: www.databreachtoday.com
14/03/2024
Data Breach Today
EU Parliament Approves the Artificial Intelligence Act – Source: www.databreachtoday.com
14/03/2024