Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Technical Documents
Page 3
Technical Documents
varonis
Pentesting Active Directory Environments by VARONIS
Practical DevSecOps
5 Books on Container Security you Must Read by Practical DevSecOps
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
JAPAN NISC
Information Security Handbook for Network Beginners – NISC – National Center of Incident Readiness and...
Logan Simpson
So You Want To Be a Hacker – A story guide by Logan Simpson
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built with zero-trust...
Malware Analysis Techniques – Tricks for the triage of adversarial software by Dylan Barker –...
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
CISO2CISO ToolBox Series
CISO2CISO Toolbox Series – Cyber Security Blogs / Cyber Security RSS Feeds List –
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security Innovation
OWASP
TOP 10 CI-CD Security Risks – OWASP
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
Ankit Pangasa
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by practical-devsecops.com
OKAN YILDIZ - SECUREDEBUG
Azure DevOps Security Checklist by OKAN YILDIZ – Securedebug
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
OECD Publishing
SECURITY OF THE DOMAIN NAME SYSTEM (DNS) – AN INTRODUCTION FOR POLICY MAKERS
HADESS
Red Team Guides 2023 by HADESS
VEDERE LABS
Common Ransomware TTPs by Vedere Labs
Salman Abdulkarim
AWS Cloud Security – The AWS Shared Responsibility Model by Salman Abdulkarim
offs.ec
PEN-200 and the OSCP prep book by offs.ec
esset
ESSET THREAT REPORT T2 2022
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
Posts navigation
1
2
3
4
Latest Cyber News
The Register Security
NCSC CTO: Broken market must be fixed to usher in new tech – Source: go.theregister.com
16/05/2024
The Register Security
FBI takes down BreachForums ransomware website and Telegram channel – Source: go.theregister.com
16/05/2024
The Register Security
Crook brags about US Army and $75B defense biz pwnage – Source: go.theregister.com
16/05/2024
Data Breach Today
Bipartisan Senators Endorse $32M Annually for AI Research – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Help Safeguard Retailers Against Social Engineering Attacks – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Understanding Imposter Syndrome in the Technology Sector – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Live Webinar | Practical Strategies for Accelerating AI Adoption in Cybersecurity – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
SIEM Stalwart LogRhythm to Merge With Exabeam – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
AI Talks: Compliance Strategies for Global Data Privacy Regulations – Source: www.databreachtoday.com
16/05/2024