Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Technical Documents
Technical Documents
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Cyborg Security
Threat Hunting Framework by Cyborg Security
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Mastercard RiskRecon
Microsoft 365 Enterprise – Security Assessment Playbook – A field guide and toolkit for assessing...
Microsoft & Capgemini
Securing Enterprise DevOps Environments – Modern App Development and Enterprise DevOps Series by Microsoft &...
Hugo Hoffman
Ethical Hacking with Kali Linux – Learn fast how to hack like a pro by...
IACS
IACS Cyber Security Incident Response Playbook
Jeff Simon
Hacking Practical Guide for beginners by Jeff Simon
WILEY
Hacking Connected Cars – Tactics, Techniques and Procedures by Alissa Knight – Wiley
SentinelOne
The Complete Guide to Understanding Apple Mac Security for Enterprise by SentinelOne
FORTINET
A Solution Guide to Operational Technology (OT) Cybersecurity by Fortinet – The “air gap” between...
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
MS Security & Mohamed Mokhtar
Microsoft Entra – The Comprensive Guide to Secure Azure AD & User Identities by Mohamed...
OWASP
Mobile Application Security Verification Standard – MASVD By OWASP
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST – Eran...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
CLOUDFLARE
Common browser isolation challenges, and how to overcome them – The intersection of Internet browsing...
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
Chris Dotson
Practical Cloud Security – A Guide for Secure Design and Deployment by Chris Dotson –...
HADESS
DevSecOps Guides – Comprehensive resource for integrating security into the software development by HADESS
varonis
Pentesting Active Directory Environments by VARONIS
Practical DevSecOps
5 Books on Container Security you Must Read by Practical DevSecOps
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
JAPAN NISC
Information Security Handbook for Network Beginners – NISC – National Center of Incident Readiness and...
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
Posts navigation
1
2
…
4
Latest Cyber News
The Register Security
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers – Source: go.theregister.com
18/04/2024
The Register Security
Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims...
18/04/2024
The Register Security
House passes bill banning Uncle Sam from snooping on citizens via data brokers – Source:...
18/04/2024
The Register Security
Korean researcher details scheme abusing Apple’s third-party pickup policy – Source: go.theregister.com
18/04/2024
The Register Security
185K people’s sensitive data in the pits after ransomware raid on Cherry Health – Source:...
18/04/2024
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024
The Register Security
Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op – Source: go.theregister.com
18/04/2024
The Register Security
Cisco creates architecture to improve security and sell you new switches – Source: go.theregister.com
18/04/2024
The Register Security
Singapore infosec boss warns China/West tech split will be bad for interoperability – Source: go.theregister.com
18/04/2024