Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
User most voted post
Page 2
User most voted post
HADESS
40 Methods for Privilege Escalation P1 by Hadess
UK HM Government
UK Government Cyber Security Strategy – Building a Cyber resilient public sector by HM Government
CSH CYBER SECURITY HUB
The state of Cloud configuration security practices by Olivia Powel – CSHUB – Find out...
BOOZ ALLEN HAMILTON
Enabling 5G Security with Continuos Monitoring by Booz Allen Hamilton
SIEMPLIFY
The Art of Recognizing and Surviving SOC Burnout – A complete Manual for Security Operations...
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
GOLDPHISH
FIVE COMMON TYPES OF PHISHING – EMAIL PHISHING , CLONE PHISHING , WHALING, SPEARPHISHING ,...
cybereason
Ransomware The True Cost to Business 2022 – A Global Study on Ransomware Business Impact...
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the age by...
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
Cobalt
The Estate of Pentesting 2022 by Cobalt
The Hacker News
Cybersecurity CISOs priorities in 2021: focus and return to the basics
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
FUTURUM - SPLUNK
How to design your Security Operations Center (SOC) to work smarter, not harder.
Google Security
Google Cloud Threat Horizons – Cloud Threat Intelligence
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
NSA
NSA’S Top Ten Cybersecurity Mitigation Strategies
CLOUDFLARE
DDoS Attack Threat Landscape trend from Q2 2022 by CLOUDFLARE
CISA
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
GFCE
Developing Cyber Security as a Profession – A report by the Global Forum on Cyber...
NIST
Guide to a Secure Enterprise Network Landscape NIST SP 800-215
CardinalOps
The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK...
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
CISSPWOMEN.COM
Introducing to Pueple Teaming – Some Attacks and Detects Methods by Saeedeh Zeinali
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
CISA
CYBER ESSENTIALS STARTER KIT – The Basics for Building a Culture of Cyber Readiness –...
Posts navigation
1
2
3
…
12
Latest Cyber News
The Register Security
Ransomware feared as IT ‘issues’ force Octapharma Plasma to close 150+ centers – Source: go.theregister.com
18/04/2024
The Register Security
Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims...
18/04/2024
The Register Security
House passes bill banning Uncle Sam from snooping on citizens via data brokers – Source:...
18/04/2024
The Register Security
Korean researcher details scheme abusing Apple’s third-party pickup policy – Source: go.theregister.com
18/04/2024
The Register Security
185K people’s sensitive data in the pits after ransomware raid on Cherry Health – Source:...
18/04/2024
The Register Security
EU tells Meta it can’t paywall privacy – Source: go.theregister.com
18/04/2024
The Register Security
Prolific phishing-made-easy emporium LabHost knocked offline in cyber-cop op – Source: go.theregister.com
18/04/2024
The Register Security
Cisco creates architecture to improve security and sell you new switches – Source: go.theregister.com
18/04/2024
The Register Security
Singapore infosec boss warns China/West tech split will be bad for interoperability – Source: go.theregister.com
18/04/2024