Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
0CISO2CISO
Page 8
0CISO2CISO
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Ciso Council
CISO Security Officer Handbook
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
MANDIANT
M-TRENDS 2022 Mandiant Special Report
snyk
The State of Cloud Security Report 2022 – A report on the cloud risks and...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
Nathalie Cole
How Much 10 Companies Paid Their Virtual CISO Service in 2022 Benchmark by Nathaniel Cole
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware Business Impact...
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
Mastercard RiskRecon
THIRD-PARTY SECURITY – RISK MANAGEMENT PLAYBOOK – A study of common , emerging, and pioneering...
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
Salman Abdulkarim
AWS Cloud Security – The AWS Shared Responsibility Model by Salman Abdulkarim
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
CISA
CYBER ESSENTIALS STARTER KIT – The Basics for Building a Culture of Cyber Readiness –...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built with zero-trust...
varonis
Pentesting Active Directory Environments by VARONIS
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
FORTINET
A Solution Guide to Operational Technology (OT) Cybersecurity by Fortinet – The “air gap” between...
Joas Antonio
Cybersecurity for Kids 1 by Joas Antonio
Posts navigation
1
…
7
8
9
…
21
Latest Cyber News
The Register Security
Gawd, after that week, we wonder what’s next for China and the Western world –...
18/05/2024
The Register Security
How two brothers allegedly swiped $25M in a 12-second Ethereum heist – Source: go.theregister.com
18/05/2024
The Register Security
Aussie cops probe MediSecure’s ‘large-scale ransomware data breach’ – Source: go.theregister.com
18/05/2024
The Register Security
Three cuffed for ‘helping North Koreans’ secure remote IT jobs in America – Source: go.theregister.com
18/05/2024
The Register Security
First LockBit, now BreachForums: Are cops winning the war or just a few battles? –...
18/05/2024
The Register Security
Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware – Source: go.theregister.com
18/05/2024
Data Breach Today
ISMG Editors: Why Synthetic ID Fraud Is on the Rise – Source: www.databreachtoday.com
18/05/2024
Data Breach Today
Healthcare Identity Security: What to Expect from Your Solution – Source: www.databreachtoday.com
18/05/2024
Data Breach Today
US SEC Approves Wall Street Data Breach Reporting Regs – Source: www.databreachtoday.com
18/05/2024