FOREWORDThe Baseline Cyber Security Controls for Small and Medium Organizations is an UNCLASSIFIED publication intended for small and medium organizations in Canada that want recommendations to...
Category: User most voted post
Attack C-Levels Notepads & Pappers CISO CISO2CISO Notepad Series DDoS DDoS Technical Documents TOP Featured Post User most voted post
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press Book
Distributed Denial of Service (DDoS) Attacks Classification, Attacks, Challenges, and Countermeasures by Brij B. Gupta & Amrita Dahiya Preface Massive technological breakthroughs have pioneered the complexity,...
C-Levels Notepads & Pappers CISO Strategics CISO2CISO Notepad Series Offensive Cybersecurity States & Goverments Cyber Capabilities Threat Actors Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague Centre for Strategic Studies
The Cyber Arms Watch – Uncovering the Stated & Perceived Offensive Cyber Capabilities of States Rationale: A lack of Transparency Conflict between states has taken on...
C-Levels Notepads & Pappers CISO CISO Leadership CISO Strategics CISO2CISO Notepad Series TOP Featured Post User most voted post
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre – ACSC
Cybercriminals and state-sponsored actors are using sophisticated techniques to compromise Australian organisations. The ACSC responds to attacks against Australian organisations every day, with the biggest threats...
C-Levels Notepads & Pappers CISO CISO Leadership CISO Strategics CISO2CISO Notepad Series Cybersecurity Leadership Practical advice for Security Leaders TOP Featured Post User most voted post
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined largely by your first 100 days in the role.
CISO CISO Strategics CISO2CISO Notepad Series Cyber Crisis Management Cyber Resilience TOP Featured Post User most voted post
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by French National Cyber Security Agency (ANSSI) – CCA France
What is frustrating about cyber security is that the benefits of the efforts made in this area are scarcely noticed: no sound is made when an...
CISO2CISO Notepad Series SOC SOC Open Source Tools THREAT INTELLIGENCE TOP Featured Post User most voted post
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
Incident Management Systems …………………………01Network Security Monitoring…………………………….02Endpoint monitoring / HIDS………………………………03Incident Response……………………………………………03Malware Sandbox and Malware Analysis…………….03Threat Intelligence Platforms……………………………04Purple Team Testing and Reporting……………………05Security Orchestration Automation and Response.08
CISO2CISO Notepad Series SOC Technical Documents Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection and Response by Crystal Bedell and Mark Bouchard – ARCTIC WOLF
Enterprise security has changed radically over the last 10 years. Antivirus and spam filters no longer provide adequate protection. Attackers bypass preventive controls and access networks...
CISO2CISO Notepad Series Microsoft Active Directory Pentest Technical Documents TOP Featured Post User most voted post
Pentesting Active Directory Environments by VARONIS
IntroductionI was talking to a pen testing company recently at a data security conference to learn more about “day in the life” aspects of their trade....
CISO Strategics CISO2CISO Notepad Series Cybersecurity Strategic Plan Threat Hunting Cybersecurity THREAT INTELLIGENCE TOP Featured Post User most voted post
Detecting the Unknown – A Guide to Threat Hunting by UK Government
The National Cyber Security Strategy 2016-2021 details the UK government’s investment in cyber security, with the vision for 2021 that the UK will be secure and...
CISO2CISO Notepad Series Cyber Security News Microsoft Cybersecurity TOP Featured Post User most voted post
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of October 11th, All Versions of Windows Can Automatically Block Admin Brute Force Attacks.
Yesterday, Microsoft announced that IT administrators can now set up group policies to automatically prevent brute force attacks against local administrator accounts on any Windows system...