Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Technical Documents
Technical Documents
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Cyborg Security
Threat Hunting Framework by Cyborg Security
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Mastercard RiskRecon
Microsoft 365 Enterprise – Security Assessment Playbook – A field guide and toolkit for assessing...
Microsoft & Capgemini
Securing Enterprise DevOps Environments – Modern App Development and Enterprise DevOps Series by Microsoft &...
Hugo Hoffman
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by...
IACS
IACS Cyber Security Incident Response Playbook
Jeff Simon
Hacking Practical Guide for beginners by Jeff Simon
WILEY
Hacking Connected Cars – Tactics, Techniques and Procedures by Alissa Knight – Wiley
SentinelOne
The Complete Guide to Understanding Apple Mac Security for Enterprise by SentinelOne
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai – Matej Havranek...
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
Joas Antonio
OSINT – The Most Complete Open Source Intelligence Overview by Joas Antonio
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
CLOUDFLARE
Simplifying the way we protect SaaS applications – How to protect users and data with...
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
CISA
2023 Top 26 Open Source Cyber Security Tools by CISA
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
SANS
SANS DFIR – CHEAT SHEETS & NOTEBOOKS – The most complete reference !!!
OWASP
Mobile Application Security Verification Standard – MASVD By OWASP
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
MS Security & Mohamed Mokhtar
Microsoft Entra – The Comprensive Guide to Secure Azure AD & User Identities by Mohamed...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
varonis
Pentesting Active Directory Environments by VARONIS
Posts navigation
1
2
…
4
Latest Cyber News
Data Breach Today
What Kind of People Do Cybersecurity for a Living? – Source: www.databreachtoday.com
10/07/2024
Data Breach Today
Cryptocurrency Theft Haul Surges Alongside Crypto Value – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
How CISA Plans to Measure Trust in Open-Source Software – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Reports: Florida Health Department Dealing With Data Heist – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
OnDemand | Secure Your Applications: Learn How to Prevent AI-Generated Code Risk – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
Taking an AI-First Approach to Securing Your Organization – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
What’s the Best Strategy for Exploiting Flaws in Ransomware? – Source: www.databreachtoday.com
09/07/2024
Data Breach Today
New Zealand Fitness Retailer Hit By DragonForce Ransomware – Source: www.databreachtoday.com
06/07/2024
Data Breach Today
Health Benefits Administrator Reports 3rd-Party Hack to SEC – Source: www.databreachtoday.com
06/07/2024