FOREWORDThe Baseline Cyber Security Controls for Small and Medium Organizations is an UNCLASSIFIED publication intended for small and medium organizations in Canada that want recommendations to...
Category: 0CISO2CISO
Attack C-Levels Notepads & Pappers CISO CISO2CISO Notepad Series DDoS DDoS Technical Documents TOP Featured Post User most voted post
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press Book
Distributed Denial of Service (DDoS) Attacks Classification, Attacks, Challenges, and Countermeasures by Brij B. Gupta & Amrita Dahiya Preface Massive technological breakthroughs have pioneered the complexity,...
C-Levels Notepads & Pappers CISO Strategics CISO2CISO Notepad Series Offensive Cybersecurity States & Goverments Cyber Capabilities Threat Actors Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague Centre for Strategic Studies
The Cyber Arms Watch – Uncovering the Stated & Perceived Offensive Cyber Capabilities of States Rationale: A lack of Transparency Conflict between states has taken on...
C-Levels Notepads & Pappers CISO CISO Leadership CISO Strategics CISO2CISO Notepad Series TOP Featured Post User most voted post
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre – ACSC
Cybercriminals and state-sponsored actors are using sophisticated techniques to compromise Australian organisations. The ACSC responds to attacks against Australian organisations every day, with the biggest threats...
C-Levels Notepads & Pappers CISO CISO Leadership CISO Strategics CISO2CISO Notepad Series Cybersecurity Leadership Practical advice for Security Leaders TOP Featured Post User most voted post
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined largely by your first 100 days in the role.
CISO CISO Strategics CISO2CISO Notepad Series Cyber Crisis Management Cyber Resilience TOP Featured Post User most voted post
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by French National Cyber Security Agency (ANSSI) – CCA France
What is frustrating about cyber security is that the benefits of the efforts made in this area are scarcely noticed: no sound is made when an...
CISO2CISO Notepad Series SOC SOC Open Source Tools THREAT INTELLIGENCE TOP Featured Post User most voted post
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
Incident Management Systems …………………………01Network Security Monitoring…………………………….02Endpoint monitoring / HIDS………………………………03Incident Response……………………………………………03Malware Sandbox and Malware Analysis…………….03Threat Intelligence Platforms……………………………04Purple Team Testing and Reporting……………………05Security Orchestration Automation and Response.08
CISO2CISO Notepad Series SOC Technical Documents Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection and Response by Crystal Bedell and Mark Bouchard – ARCTIC WOLF
Enterprise security has changed radically over the last 10 years. Antivirus and spam filters no longer provide adequate protection. Attackers bypass preventive controls and access networks...
CISO2CISO Notepad Series Microsoft Active Directory Pentest Technical Documents TOP Featured Post User most voted post
Pentesting Active Directory Environments by VARONIS
IntroductionI was talking to a pen testing company recently at a data security conference to learn more about “day in the life” aspects of their trade....
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech professionals by Nadean Tanner
There are plenty of books exploring the individual, highly technical components of cybersecurity. They offer specialized, narrowly focused training on a multitude of topics and technologies....
CISO Strategics CISO2CISO Notepad Series Cyber Security Vendors Directory Privacy Privacy Solutions Vendors Directory TOP Featured Post
2022 PRIVACY TECH VENDOR REPORT by IAPP
The IAPP presents its sixth annual “Privacy Tech Vendor Report.” In previous editions, the reportexamined the growth and trends of the privacy technology marketplace year over...