Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
CISO
Page 52
CISO
Ankit Pangasa
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
OKAN YILDIZ - SECUREDEBUG
Azure DevOps Security Checklist by OKAN YILDIZ – Securedebug
ECSO
Chief Information Security Officers – CISOs – Challenges & Priorities Survey Analysys Report by European...
The Hacker News
thehackernews – 3 Ways to Secure SAP SuccessFactors and Stay Compliant
Boston Consulting Group
Turning a Cybersecurity Strategy Into Reality – A Holistic Performance Management Framework by Boston Consulting...
NIST
Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP) – NIST Special Publication...
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
James Smith
TOR AND THE DARKNET – Remain Anonymous and Evade NSA Spying by James Smith
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
SANSInstituteSecurity
A SANS 2021 survey – Security operations center
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
SCF
Secure & Privacy by Design Principles Framework & Security & Privacy Capability Maturity Model (SP-CMM)...
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
NIST
Guide for Developing Security Plans by NIST
HP WOLF SECURITY
The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How...
CISO2CISO.COM
Top 5 Myths of Cybersecurity
ENISA
TELECOM SECURITY INCIDENTS REPORT 2021 BY ENISA
PALADION CYBER DEFENSE
45 SIEM Use Cases for Security Monitoring by Paladion Cyber Defense.
Bitdefender
Anatomy of an Industrial espionage operation by Bitdefender
Joas Antonio
Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
CSO Online
7 Best Reasons to be a CISO by Michaell Hill UK Editor CSO
CYBERUP
Legitimate Cyber Security Activities in the 21st Century by CyberUP
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Dutch Blockchain Coalition
Blockchain Security – A Framework for Trust and Adoption by Dutch Blockchain Coalition
CISA
SECURING THE SOFTWARE SUPPLY CHAIN – RECOMMENDED PRACTICES GUIDE FOR DEVELOPERS
Posts navigation
1
…
51
52
53
…
63
Latest Cyber News
The Hacker News
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw – Source:thehackernews.com
02/05/2024
The Hacker News
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability – Source:thehackernews.com
02/05/2024
The Hacker News
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials – Source:thehackernews.com
02/05/2024
Krebs On Security
Man Who Mass-Extorted Psychotherapy Patients Gets Six Years – Source: krebsonsecurity.com
01/05/2024
Krebs On Security
FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data – Source: krebsonsecurity.com
01/05/2024
The Register Security
Infosec biz boss accused of BS’ing the world about his career, anti-crime product, customers –...
01/05/2024
The Register Security
US charges 16 over ‘depraved’ grandparent scams – Source: go.theregister.com
01/05/2024
The Register Security
Qantas app glitch sees boarding passes fly to other accounts – Source: go.theregister.com
01/05/2024
The Register Security
Ring dinged for $5.6M after, among other claims, rogue insider spied on ‘pretty girls’ – Source: go.theregister.com
01/05/2024