CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
Latest News -
27/05/2023 - 6:23 PM -
BSidesSF 2023 – Alexis Hancock – HSMs in Plain Envelopes: A Code Signing Story – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
Live phishing tests not getting the results you want? Here’s what to do. – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
BSidesSF 2023 – Leif Dreizler – Tracking Meaningful Security Product Metrics – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
The Developer’s Guide to Mobile Authentication – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
What are FedRAMP Requirements? (And Who Needs to Know) – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
Daniel Stori’s ‘# $ To Devops Or Not To Devops’ – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
Phishing Domains Tanked After Meta Sued Freenom – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
Are Your Company Secrets Safe on GitHub? Here’s Why You Need to Request a Complimentary Audit – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
BSidesSF 2023 – Shobhit Mehta – Lessons Learned While Building a Privacy Operations Center at Headspace Health – Source: securityboulevard.com
27/05/2023 - 6:23 PM -
Latitude Financial Attack Costs Company Up to AU$105 Million – Source: www.databreachtoday.com
27/05/2023 - 6:23 PM -
Pegasus Spyware Spotted in Nagorno-Karabakh War – Source: www.databreachtoday.com
27/05/2023 - 6:23 PM -
Webinar | Outsmarting the Hackers: Next-Level Strategies for Battling Third-Party Cyber Risks – Source: www.databreachtoday.com
27/05/2023 - 6:23 PM -
Medical Specialty Practice Says Recent Hack Affects 224,500 – Source: www.databreachtoday.com
27/05/2023 - 6:23 PM -
Expel, CrowdStrike, Red Canary Dominate MDR Forrester Wave – Source: www.databreachtoday.com
27/05/2023 - 2:23 PM -
The Week in Ransomware – May 26th 2023 – Cities Under Attack – Source: www.bleepingcomputer.com
27/05/2023 - 2:23 PM -
Microsoft Defender Antivirus gets ‘performance mode’ for Dev Drives – Source: www.bleepingcomputer.com
27/05/2023 - 1:23 PM -
New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets – Source:thehackernews.com
27/05/2023 - 1:23 PM -
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
27/05/2023 - 12:23 PM -
Careless IT security worker exploited ransomware attack against his employer, but failed to cover his tracks – Source: www.tripwire.com
27/05/2023 - 9:23 AM -
Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation – Source: www.securityweek.com
Home
Pages: CISO2CISO Cyber Security Notepad Series for CISOs
Lastest Published Posts
SHADOW DRAGON
A Practical Guide for OSINT Investigators to Combat Disinformation and Fake Reviews Driven by AI...
Sudhansu M Nayak
The Purple Book on Cyber Security – Introduction for Sales, Pre-sales & Delivery Beginners by...
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
HADESS
DevSecOps Guides – Comprehensive resource for integrating security into the software development by HADESS
Logan Simpson
3 questions your CEO has about Cybersecurity in simple terms by Logan Simpson
DYNATRACE
The convergence of observability and security is critical to realizing DevSecOps potential. Dynatrace CISO report...
SONICWALL
2023 SONICWALL CYBER THREAT REPORT – Charting Cybercrime´s Shifting Frontlines
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
Kaspersky
Incident Response 2022 Report by Kaspersky
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
FATF
Countering Ransomware Financing – FATF Report March 2023
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
isms Forum
DevSecOps Beginner´s Guide to Security applied to DevOps by isms forum
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
World Economic Forum
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report...
exabean
The Ultimate Guide to Insider Threats eBook by exabeam
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
exabean
A CISOs Guide to Defender Alignment by exabean
IACS
IACS Cyber Security Incident Response Playbook
Apress
Quick Start Guide to Penetration Testing with NMAP , OpenVAS & Metaexploit by Sagar Rahalkar...
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
ANALYST1 - Jon DiMaggio
The Ransomware Diaries – Volume 2 – A Ransomware Hacker Origin Story by Jon DiMaggio
ANALYST1
The Ransomware Diaries – Volume 1 by ANALYST1
CISOs Club
Cybersecurity Reports – March 2023 by CISOs Club. You must see it!
Jeff Simon
Hacking Practical Guide for beginners by Jeff Simon
MANDIANT
MANDIANT – M-Trends 2023 – Mandiant Special Report
Chris Romano - CareerUP
Cybersecurity Terms – Quick guide to CyberSecurity MUST KNOW – ENTRY-LEVEL TERMS by Chris Romano
ECCRI
The Cyber Dimensions of the Russia-Ukraine War by European Cyber Conflict Research Initiative (ECCRI).
Prancer
Developer´s Guide to OWASP – Top 10 API Security vulnerabilities & MITRE ATT&ACK framework relation...
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
ZERONORTH
Are Quality and Security Synonymous in Software by Zeronorth
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
Federico Hansen
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
Dror Amrami
TESLA Cars Cyber Security – Threats Vulnerabilities Hacking Protection by Dror Amrami
NSA & CISA
Recommended best practices for Administrators – Identity and Access Management by NSA & CISA
David E. Sanger
The Perfect Weapon – WAR, SABOTAGE and FEAR in the Cyber Age by David E....
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
SANS
New to Cyber Field Manaul – The Ultimate Guide to Getting Into Cybersecurity by SANS...
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
WILEY
Hacking Connected Cars – Tactics, Techniques and Procedures by Alissa Knight – Wiley
SentinelOne
The Complete Guide to Understanding Apple Mac Security for Enterprise by SentinelOne
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
Lawrence C. Miller
Cybersecurity for Dummies by Lawrence C. Miller
Packt
Hack the Cybersecurity Interview – A complete Interview Preparation Guide for jumpstarting your cybersecurity career...
CRC Press
CISO Guidance Free Book by CRC Press
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
Insecurity Insight - EISF - RedR_UK
Security Incident Information Management Handbook
cepal.org
Cybersecurity and the role of the Board of Directors in Latin America and the Caribbean...
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
KELA INTELLIGENCE
Telegram – How a Messenger Turned into a Cybercrime Ecosystem by 2023 by Kela Cybercrime...
Palo Alto Networks
The State of Cloud Native Security Report 2023 by Paloalto Networks
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
CISA
Zero Trust Matutity Model by CISA
Mastercard RiskRecon
Microsoft 365 Enterprise – Security Assessment Playbook – A field guide and toolkit for assessing...
Cyborg Security
Threat Hunting Framework by Cyborg Security
CISA
Shifting the Balance of Cybersecurity Risk – Principles and Approaches for Secure-by-Design – Secure-by-Default –...
Microsoft & Capgemini
Securing Enterprise DevOps Environments – Modern App Development and Enterprise DevOps Series by Microsoft &...
SentinelOne
Be careful: 10 Assumptions About macOS Security that put Businesses At Risk by SentinelOne
Joas Antonio
OSINT – The Most Complete Open Source Intelligence Overview by Joas Antonio
PRASANNAKUMAR MUNDAS
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR...
CISA
The Business Case for Security by CISA – Understand Your Security Posture
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
ECSO
Chief Information Security Officers – CISOs – Challenges & Priorities Survey Analysys Report by European...
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
sottlmarek
ULTIMATE DEVSECOPS LIBRARY – Tools, Resources & methodologies by sottlmarek
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
Info-Tech Research Group
Best vendor agnostic SIEM for SOCs solution implementation guide by Info-Tech Research Group
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
BHInfoSecurity
Blue Team Perspective & Red Team Tools by Black Hills Information Security – BHinfoSecurity
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
ENISA-EUROPA
Cybersecurity of AI (Artificial intelligence) and standarisation by enisa and European Union Agency for Cybersecurity
Flashpoint
State of Cyber Threat Intelligence 2023 – A deep dive into perpetual cycles of cybercrime...
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
VEDERE LABS
Common Ransomware TTPs by Vedere Labs
OKAN YILDIZ - SECUREDEBUG
Azure DevOps Security Checklist by OKAN YILDIZ – Securedebug
OWASP
TOP 10 CI-CD Security Risks – OWASP
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
JAPAN NISC
Information Security Handbook for Network Beginners – NISC – National Center of Incident Readiness and...
Chris Dotson
Practical Cloud Security – A Guide for Secure Design and Deployment by Chris Dotson –...
Recorded Future
The Security Intelligence Handbook – How to Disrupt Adversaries and Reduce Risk with Security Intelligence...
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
OWASP
Mobile Application Security Verification Standard – MASVD By OWASP
CISA
2023 Top 26 Open Source Cyber Security Tools by CISA
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
Red Canary
2023 THREAT DETECTION REPORT – TECHNIQUES, TRENDS AND TAKEAWAYS BY Red Canary
NACD - Internet Security Alliance
Cyber-Risk Oversight2020 – Key Principles and Practical Guidance for Corporate Boards by NACD Internet Security...
Europol
ChatGTP – The impact of Large Language Models on Law Enforcement by EUROPOL
James Smith
TOR AND THE DARKNET – Remain Anonymous and Evade NSA Spying by James Smith
Packt
Cybersecurity Blue Team Strategies – Uncover the secrets of blue teams to combat cyber threats...
CSA Cloud Security Alliance
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 by CSA Cloud Security...
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have built more than 150 open source...
CISA
Making a Business Case for Security – An Interagency Security Committee Best Practice by CISA...
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
creative commons
OWASP API Security Top 10 – The Ten Most Critical API Security Risks by creative...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
HADESS
Red Team Guides 2023 by HADESS
Practical DevSecOps
API Security Fundamentals – Your Handy Guide to Building an Unhackable System by practical-devsecops.com
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
Dinesh Shetty - Security Innovation
Hacking iOS Applications – A detailed testing guide by Dinesh Shetty – Security Innovation
Malware Analysis Techniques – Tricks for the triage of adversarial software by Dylan Barker –...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
Packt
Windows Ransomware Detection and Protection – Securing Windows endpoints , the cloud and infrastructure using...
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
MANDIANT
MANDIANT APT1 – Exposing One of Chinas Cyber Espionage Units
MIT Technology Review
The Cyber Defense Index 2022-23 – A benchmark of the digital security preparedness of enterprises...
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
Chainalysis
The 2023 Crypto Crime Report by Chainalysis – Everithing you need to know about cryptocurrency-based...
Stanton House
Cybersecurity Salary for US market and Recruiting Trends Guide 2023 by Stanton House
Stanton House
CYBERSECURITY The Ultimate Hiring Guide by Stanton house
FBI - Federal Bureau of Investigation
Internet Crime Report 2022 by FBI Internet Crime Compliance Center
NIST
Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) by NIST – Eran...
World Economic Forum
Global Cybersecurity Outlook 2023 Insight Report by WEF – World Economic Forum in collaboration with...
State service of Ukraine
Russia´s Cyber Tactics – Lessons Learnead 2022 by Information Protection of Ukraine
SANSInstituteSecurity
SANS Institute – Incident Handler´s Handbook by Patrick Kral
RiskLens
Cybersecurity Risk Report 2023 by RiskLens
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
MS Security & Mohamed Mokhtar
Microsoft Entra – The Comprensive Guide to Secure Azure AD & User Identities by Mohamed...
SANS
SANS DFIR – CHEAT SHEETS & NOTEBOOKS – The most complete reference !!!
Bruce Schneier
The Coming AI Hackers – Council for the responsible use of AI by Bruce Schneier
Joas Antonio
ChatGPT for Cybersecurity by Joas Antonio dos Santos – malwareanalysis #reverseengineering
United Nations - ONU
Digest of Cyber Organized Crime by UNODC – United Nations Office on Drugs and Crime
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
CROWDSTRIKE
CROWDSTRIKE 2023 GLOBAL THREAT REPORT
OEA - CIC - CISCO
Reporte sobre el desarrollo de la FUERZA LABORAL DE CIBERSEGURIDAD 2023 by OEA, CIC y...
Bipartisan Policy Center
Top Risk in Cybersecurity 2023 by Bipartisan Policy Center
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
ACFE
ANTI-FRAUD PLAYBOOK – THE BEST DEFENSES IS A GOOD OFFENSE BY ACFE – FRAUD RISK...
OECD Publishing
ROUTING SECURITY – BGP INCIDENTS, MITIGATION, TECHNIQUES AND POLICY ACTIONS BY OECD
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta –...
National Cyber Crime Agencie
Manual on Social Media Intelligence (SOCMINT) for Law Enforcement Agencies by National Cyber Crume Research...
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
esset
ESSET THREAT REPORT T2 2022
OECD Publishing
SECURITY OF THE DOMAIN NAME SYSTEM (DNS) – AN INTRODUCTION FOR POLICY MAKERS
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber...
Ankit Pangasa
Security Protocols – SSL vs TLS – ALL YOU NEED TO KNOW.
EKOPARTY SECURITY CONFERENCE
#EKOPARTY2022 – Ekoparty is a technical security conference born in 2001. +3000 guests, single track, workshops,...
CISO2CISO ToolBox Series
CISO2CISO Toolbox Series – Cyber Security Blogs / Cyber Security RSS Feeds List –
Canadian Centre for CyberSecurity
BASELINE CYBER SECURITY CONTROLS FOR SMALL AND MEDIUM ORGANIZATIONS V1.2 by Canadian Centre for CYBERSECURITY
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
PICUS
ILLUMINATING DARKSIDE – TTPs, Tools, and the Trend Towards Defense Evasion by PICUS
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
varonis
Pentesting Active Directory Environments by VARONIS
WILEY
CYBERSECURITY – BLUE TEAM TOOLKIT – A practical cybersecurity handbook for both tech and non-tech...
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
Microsoft Security
Microsoft Implements Brute Force Attack Protection for All Windows Versions – As of October 11th,...
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
ENDGAME
KERNEL MODE THREATS AND PRACTICAL DEFENSES BY Joe Desimone and Ganriel Landau – ENDGAME
NHTSA
Cybersecurity Best Practices for the Safety of Modern Vehicles – Updatd 2022 by NHTSA
CLOUDFLARE
Simplifying the way we protect SaaS applications – How to protect users and data with...
Virusbulletin.com
LAZARUS AND BYOVD – EVIL TO THE WINDOWS CORE By Peter Kalnai – Matej Havranek...
Alejandro Corletti - Darfe.es
Libro Ciberseguridad – Una estrategia Informatica-Militar by Alejandro Corletti Estrada – darfE.es
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
Cobalt
The Estate of Pentesting 2022 by Cobalt
CheckPoint
KEEPING YOUR EMAIL SECURE – WHO DOES IT BEST ? A Especial analysis by Checkpoint.
Cybersecurity Top Youtube Channels
Cybersecurity 85 Top Youtube Channels on Github.com
Salman Abdulkarim
AWS Cloud Security – The AWS Shared Responsibility Model by Salman Abdulkarim
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
rpi
THE IoT LANDSCAPE – The next decade of the Internet of Things by rpi –...
FORTINET
A Solution Guide to Operational Technology (OT) Cybersecurity by Fortinet – The “air gap” between...
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
SCF
Secure & Privacy by Design Principles Framework & Security & Privacy Capability Maturity Model (SP-CMM)...
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
CAREER UP
7 Steps to your Cybersecurity Career – How to begin your career in Cibersecurity By...
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
IGNITE Technologies
RDP Penetration Testing by IGNITE Technologies
Joas Antonio
Windows Persistence Techniques by Joas Antonio
ALEX SIDORENKO & ELENA DEMIDENKO
GUIDE TO EFFECTIVE RISK MANAGEMENT 3.0 – ALEX SIDORENKO – ELENA DEMIDENKO
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
CSA Cloud Security Alliance
SaaS Governance Best Practices Cloud by CSA Cloud Security Alliance
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server
PWC
2022 Global Digital Trust Insights – The C-suite guide to simplifyng for cyber readiness today...
CYBERSECURITY INSIDERS
THREAT HUNTING REPORT – Cybersecurity Insiders – DOMAINTOOLS 2021
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar (PCI DSS)...
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built with zero-trust...
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
PEERLYST
INTRUSION DETECTION GUIDE – The fields leading experts show exactly how to detect, deter, and...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
NSA and NISA
Control System Defense – Know the Opponent by NSA and NISA
Cencys
2022 State of the internet report by cencys
O´REILLY
10 Steps Every CISO Should Take to Secure Next-Gen Software by Cindy Blake – O´REILLY...
TRIMARC
10 WAYS TO IMPROVE AD SECURITY QUICKLY – list of widely applicable “easy” wins for...
Packt
Guia de Implementacion y Estrategia de Azure cuarta edicion by Packt
Practical DevSecOps
You are probably doing DevSecOps Wrong by Practical DevSecOps – DevSecOps can seem like a...
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access, lack of...
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
SecurityGen
5G Cybersecurity – Telecom Cybersecurity – Decoding the ecosystem and its vulnerabilities by SecurityGen –...
BCG Global Cybersecurity Forum
Why Children Are Unsafe in Cyberspace ? Any effort to protect children in cyberspace must...
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
Joas Antonio
Game Hacking 1 – Anti Cheat Bypass by Joas Antonio
NIST
National Initiative for Cybersecurity Education (NICE) – Cybersecurity Workforce Framework – NIST Special Publication 800-181
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
ENISA-EUROPA
European Cybersecurity Skills Framework by ENISA & European Union Agency for Cybersecurity. Note: If you...
SIMPLILEARN
Cloud Computing In 6 Minutes | What Is Cloud Computing? | Cloud Computing Explained |...
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
Ministerio del Interior España
Guía sobre controles de seguridad en sistemas OT – Ministerio del Interior de España
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
snyk
The State of Cloud Security Report 2022 – A report on the cloud risks and...
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
CROWDSTRIKE
2022 Falcon OverWatch Threat Hunting Report – NOWHERE TO HIDE by CROWDSTRIKE
ConversationalGeek Series
ConversationalGeek Series – Cyber Insurance by Joseph Brunsman – Delinea
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
sysdig snyk
Checklist Container Security from Code to Runtime by sysdig snyk
Google Cybersecurity Action Team
Modern Data Security – A path to autonomic data security by Dr. Anton Chuvakin and...
DNSSENSE
DNS LAYER SECURITY from the MITRE ATT&CK Perspective whitepapper by DNSSense
F-Secure Labs Hardware Security Team
THE FAKE CISCO – Hunting for backdoors in Counterfeit Cisco devices – by Dmitry Janushkevich...
Verizon Cyber Security
PSR 2022 – Payment Security Report 2022 by Verizon Cyber Security Consulting
Mastercard RiskRecon
THIRD-PARTY SECURITY – RISK MANAGEMENT PLAYBOOK – A study of common , emerging, and pioneering...
RELIAQUEST
Threat Hunting 101 – A Framework for Building and Maturing a Proactive Threat Hunting Program...
MANDIANT
M-TRENDS 2022 Mandiant Special Report
Andreessen Horowitz
State of Crypto & the Web3 An overview report
Andreessen Horowitz
Web3 Defined – An overview report by Brainsy
Telefonica Tech & Nozomi Networks
Cybersecurity in OT Environments – Case Study in the Oil & Gas Sector by Telefonica...
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
FORGEROCK
2022 Consumer Identity Breach Report by ForgeRock – Eve Maler.
MANDIANT
Remediation and Hardering Strategies for Microsoft 365 to Defend Against APT29 Group – Threat Intelligence...
MALTEGO
Maltego handbook for Incident Response
Recorded Future
Malware and Vulnerability Trends Report H1 2022 by Recorded Future
Renee Tarun y Susan Burg
CIBER SEGURO – Una guía perruna sobre seguridad en Internet para niños y adultos “todos...
offs.ec
PEN-200 and the OSCP prep book by offs.ec
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
trendmicro
A global study EVERYTHING IS CONNECTED – Uncovering the ransomware threat from global supply chains...
KPMG
Adopting secure DevOps – An introduction to transforming your organization by KPMG
Cider Security
Top 10 CI/CD Security Risks by Cider Security
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
CLOUDFLARE
5 Ways to Maximize the Security, Performance and Reliability of Your Online Business by Cloudflare
ONAPSIS
Five Ways to Secure SAP S/4 HANA Migrations by ONAPSIS
VIRUSTOTAL
Deception at Scale – How Malware Abuses Trust by VIRUSTOTAL
Ministry of Digital - Greece
CYBERSECURITY HANDBOOK – Best practices for the protection and resilience of network and information systems...
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
VINOD KUMAR
Telecom Threat Detection via Stride Mapping Case Study
sqrrl
HUNTPEDIA – Your Threat Hunting Knowledge Compendium by sqrrl
RIT
Guide to Risk Assessment and Response by RIT
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
McKinsey & Company
Value creation in the metaverse – The Real business of the virtual world by McKinsey...
CRS Report Services
The Metaverse – Concepts and Issues for Congress by Congressional Research Service
SLOWMIST
Blockchain Security and AML Analysis Report 2022 Mid-Year by SLOWMIST
HADESS
GITHUB IN THE WILD – Some examples of offensive security used github by HADESS
Interpol
GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS BY INTERPOL
Joas Antonio
Ransomware Investigation (OSINT & HUNTING) Overview PT1 by Joas Antonio
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
Cryptomeria Capital
The Metaverse Overview by Cryptomeria Capital – Vadim Krekotin
INDUSTRIAL DEFENDER
2022 State of Operational Technology (OT) Cybersecurity Survey – Research Report by INDUSTRIAL DEFENDER
KPMG
The Seven ways of the agile CISO – Cyber security leadership in the age by...
Practical DevSecOps
The 4 Pillards of DevSecOps – CAMS: 1.Culture, 2.Automation, 3.Measurement and 4.Sharing) By Practical DevSecOps
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
HONEYWELL FORGE
Industrial Cybersecurity USB Threath Report 2022 – Threats designed for USB exploitation rise to 52%....
CISA
SECURING THE SOFTWARE SUPPLY CHAIN – RECOMMENDED PRACTICES GUIDE FOR DEVELOPERS
Ben McCarty - No Start Press
Cyberjutsu – Cybersecurity for the Modern Ninja by Ben McCarty
GSA
Zero Trust Architecture (ZTA) Buyer´s Guide by GSA
CSA Cloud Security Alliance
Earning Trust in the 21st Century – Cloud Security Alliance – DC (CSA-DC) Research
CSA Cloud Security Alliance
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud Security Alliance...
Claudio Benavente
Attack Surface Management by Claudio Benavente Cyber Security Advisor
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
DRAGOS
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU...
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS