Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
User most voted post
User most voted post
Incibe
Guía de ciberseguridad para todos by Incibe y Policia Nacional
Microsoft Security
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of October 11th,...
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
World Economic Forum
The Cyber Resilience Index by World Economic Forum
KISA
CISO Guidebook by Korean Internet & Security Agency (KISA).
Recorded Future
THE BUSINESS OF FRAUD : An Overview of How Cybercrime Gets Monetized by Recorded Future.
Hacker Combat
List Of Top Penetration Testing Tools by Hacker Combat.
Apress
Financial Cybersecurity Risk Management by Paul Rohmeyer & Jennifer Bayuk- Springer – APRESS
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
NCSC
Guidance for Reducing data exfiltration by malicious insiders by National Cyber Security Centre (NCSC)
ASPIRE SYSTEMS
A Complete Guide to Implementing DevSecOps in AWS by aspire
Joas Antonio
Cybersecurity for Kids 2 by Joas Antonio
Splunk
The Transformational CISOs Guide to Security Orchestration, Automation and Response – How giving security teams...
MORPHISEC
Zero Trust + Moving Target Defense – Stopping Ransomware, Zero-Day and Others Advanced Threats where...
OPEN RESEARCH SOCIETY
The Cyber Intelligence Analyst’s Cookbook by The OPEN RESEARCH SOCIETY
DRAGOS
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU...
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
Andreessen Horowitz
Web3 Defined – An overview report by Brainsy
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
Center for Internet Security
CIS Software Supply Chain Security Guide by Center for Internet Security (CIS)
US Deparment of Energy
Cibersecurity Capability Maturity Model (C2M2) by US Department of Energy
LMNTRIX
How to Become a CISO by LMNTRIX
LIFARS
Phyton Pentest Cheat Sheet by LIFARS
Apress
Professional Red Teaming – Conducting Successful Cybersecurity Engagements by Jacob G Oakley – Apress
CSBS.ORG
CYBERSECURITY 101 – A Resource Guide for Financial Sector Executives by John W. Ryan
Posts navigation
1
2
…
12
Latest Cyber News
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks...
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Dark Web Sales Driving Major Rise in Credential Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Hacking the Floodgates: U.S. Dams Face Growing Cyber Threats – Source: www.databreachtoday.com
19/04/2024
The Register Security
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers – Source: go.theregister.com
18/04/2024