Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
User most voted post
Page 4
User most voted post
HHS
The Evolution of Cyber Hunt Processes From IOCs to TTPs by HHS OIS Organization
eForensics Magazine
Open Source Forensic Tools by eForensics Magazine
SYNGRESS
The Basics of Information Security – Understanding the Fundamentals of InfoSec in Theory and Practice...
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
Phillip Wylie
The Pentester Blueprint – a Guide to Becoming a Pentester
PreScouter
Quantum Computing and Cybersecurity – Preparing for Post-Quantum Cryptography
CHECKPOINT RESEARCH
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
International Energy Agency
Enhancing Cyber Resilience in Electricy Systems by International Energy Agency
SEC ESPAÑA
INFORME SOBRE LA CIBERCRIMINALIDAD EN ESPAÑA POR SISTEMA ESTADISTICO DE CRIMINALIDAD SEC
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special Publication 800-181
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
Cencys
2022 State of the internet report by cencys
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
rpi
THE IoT LANDSCAPE – The next decade of the Internet of Things by rpi –...
Salt Labs
The State of API Security Q1 2022 Report from Salt Labs
WILEY
PCI Compliance for Dummies
BeyondTrust
2022 Microsoft Vulnerabilities Report by BeyondTrust (you must read).
OWASP
Web Security Testing Guide by OWASP
SANS
A SANS 2021 Survey for Security Operations Centers (SOCs)
Bitdefender
Anatomy of an Industrial espionage operation by Bitdefender
IGNITE Technologies
Nmap for Pentesters – A Beginners Guide By Ignite Technologies
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
blueteamfieldmanual.com
BTFM – Blue Team Field Manual 2022 – by Alan White and Ben Clark
Bastian Ballman - Springer
Undestanding Networks Hacks – Attack and Defense with Python 2nd Edition by Bastian Ballman –...
HEIDRICK & STRUGGLES
2022 Global Chief Information Security Officer (CISO) Survey by HEIDRICK & STRUGGLES – SPECIALITY PRACTICES...
Practical DevSecOps
5 Books on Container Security you Must Read by Practical DevSecOps
CSA Cloud Security Alliance
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud Security Alliance...
Posts navigation
1
…
3
4
5
…
12
Latest Cyber News
The Register Security
NCSC CTO: Broken market must be fixed to usher in new tech – Source: go.theregister.com
16/05/2024
The Register Security
FBI takes down BreachForums ransomware website and Telegram channel – Source: go.theregister.com
16/05/2024
The Register Security
Crook brags about US Army and $75B defense biz pwnage – Source: go.theregister.com
16/05/2024
Data Breach Today
Bipartisan Senators Endorse $32M Annually for AI Research – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Help Safeguard Retailers Against Social Engineering Attacks – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Understanding Imposter Syndrome in the Technology Sector – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
Live Webinar | Practical Strategies for Accelerating AI Adoption in Cybersecurity – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
SIEM Stalwart LogRhythm to Merge With Exabeam – Source: www.databreachtoday.com
16/05/2024
Data Breach Today
AI Talks: Compliance Strategies for Global Data Privacy Regulations – Source: www.databreachtoday.com
16/05/2024