Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
0CISO2CISO
Page 9
0CISO2CISO
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
Sittikorn Sangrattanapitak
Indicator of Attack (IoAs) and Activities – SOC-SIEM – A Detailed Explanation by GBHackers On...
Cobalt
The Estate of Pentesting 2022 by Cobalt
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
WILEY
Cybercrime Investigators Handbook by WILEY
Chris Davis
Blue Team Cheat Sheets by Chris Davis
McKinsey & Company
Value creation in the metaverse – The Real business of the virtual world by McKinsey...
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
Cencys
2022 State of the internet report by cencys
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis by Checkpoint.
CSA Cloud Security Alliance
SaaS Governance Best Practices Cloud by CSA Cloud Security Alliance
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
Cyber Rescue Alliance
The Best Cyber Insights of 2022 by The Cyber Rescue Alliance
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
NSA and NISA
Control System Defense – Know the Opponent by NSA and NISA
SentinelOne
90 DAYS A CISO´s Journey to Impact define your role !!
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
CISO2CISO Notepad Series
How Can We Structure Cybersecurity Teams To Better Integrate Security In Agile At Scale?
RIT
Guide to Risk Assessment and Response by RIT
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special Publication 800-181
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
Posts navigation
1
…
8
9
10
…
21
Latest Cyber News
The Register Security
REvil ransomware scum sentenced to almost 14 years inside, ordered to pay $16 million –...
02/05/2024
The Register Security
A million Australian pubgoers wake up to find personal info listed on leak site –...
02/05/2024
The Register Security
Dropbox dropped the ball on security, haemorrhaging customer and third-party info – Source: go.theregister.com
02/05/2024
The Register Security
Block accused of mass compliance failures that saw digi-dollars reach terrorists – Source: go.theregister.com
02/05/2024
The Register Security
Microsoft cannot keep its own security in order, so what hope for its add-ons customers?...
02/05/2024
The Register Security
Management company settles for $18.4M after nuclear weapons plant staff fudged their timesheets – Source:...
02/05/2024
The Hacker News
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw – Source:thehackernews.com
02/05/2024
The Hacker News
Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million – Source:thehackernews.com
02/05/2024
The Hacker News
When is One Vulnerability Scanner Not Enough? – Source:thehackernews.com
02/05/2024