Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Notepad Series for CISOs
Lastest Published Posts
O'Reilly
Practical Cloud Security
Incibe
CISO Libro Blanco
NACD
CISO handbook 2023
CREATED BY IBRAHIM S ALEH
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
CERT-EU
THREAT LANDSCAPE REPORT 2023
A Historical Journey Through Cybersecurity
IGNITE Technologies
A Detailed Guide for Pentester on Wfuzz
IGNITE Technologies
A Detailed Gidue on Command & Control (C2)
Ntirety
2024 Tech Predictions
Thecyphere
10 Steps to Cyber Security New Explained Cyphere
W W W . D E V S E C O P S G U I D E S . C O M
2FA Security Issues
Blue Team Notes
ENISA
BEST PRACTICES FOR CYBER CRISIS MANAGEMENT
BRIEF
Automated Threat Modeling with Threat Canvas
IGNITE Technologies
ANDROID PENTEST
IGNITE Technologies
Android Penetration Testing MOBSF FRAMEWORK
Active Directory
Active Directory PenTesting Tools
Sectrio
Vulnerability Assessment & Penetration Testing (VAPT)
IGNITE Technologies
Android Penetration Testing
Kaspersky
Incident Response Playbook: Dark Web Breaches
World Economic Forum
Cybersecurity Futures 2030
Interlinked Computingin 2040: Safety,Truth, Ownership, and Accountability
Agency for Digital Government
Cyber security in supplier relation ships
RED SIFT
State of Cyber Resilience 2023
ministry of security
DECODING CYBER ATTACKS
IGNITE Technologies
AUTOPSY LINUX AND WINDOWS
CheatSheets of Common Attacks
AICPA
CGMA Cybersecurity Tool
IGNITE Technologies
BURP SUITE FOR PENTESTER HACK BAR
Awesome Incident Response
Awesome Bug Bounty Tools
IGNITE Technologies
Android Penetration Testing
IGNITE Technologies
BURP SUITE for PENTESTER
Acronis
Acronis Cyber threats Report, H2 2023
IIRM
A Practical Guide to Enterprise Risk Management
IGNITE Technologies
Windows Privilege Escalation
HADESS
Moxa ioLogik E1212
HornetSecurity
MICROSOFT 365 SECURITY CHECKLIST
VIEH GROUP
METASPLOIT ESSENTIALS
IGNITE Technologies
Windows Privilege Escalation
Lock Your Doors
Kaspersky
Cybersecurity Alphabet
John the Ripper
John The Ripper A Pentester Guide
CYFIRMA
Caught in the Crossfire
DigiSPEAK
English Vocab for TECH
LUMU
DISRUPTING MSP CYBERSECURITY
IGNITE Technologies
DIGITAL FORENSICS – AN INTRODUCTION
SYNGRESS
THE BASICS OF WEB HACKING
NATIONAL PRIVACY COMMISSION
NPC PRIVACY TOOLKIT
Secure Claw
CYBER THREAT INTELLIGENCE ADVISORY REPORT
CRC Press
INTELLIGENT APPROACHES TO CYBER SECURITY
European Center for Digital Rights
GDPR: a culture of non-compliance?
cisco
Privacy as an Enabler of Customer Trust
National Cyber Security Centre
Prepare for Zero Trust
ENGINEERING THE DIGITAL TRANSFORMATION COMPANY
OT SECURITY
IGNITE Technologies
TRAINING PROGRAM
IGNITE Technologies
A DETAILED GUIDE ON HONEYPOTS
ACSC Australia
Identifying and Mitigating Living Off the Land Techniques
IGNITE Technologies
Nmap for Pentester PACKET TRACE
NACD - Internet Security Alliance
DIRECTOR’S HANDBOOK ON CYBER-RISK OVERSIGHT
IGNITE Technologies
MULTIPLE METHOD TO SETUP KALI LINUX
EC-council
THREAT REPORT 2024
sqreen
Pentest Best Practices Checklist
IGNITE Technologies
NMAP FOR PENTESTER
HADESS
NTLM Abuse Methods
IGNITE Technologies
NETCAT FOR PENTESTER COMPREHENSIVE GUIDE
FORESIGHT
Models for risk analysis and assessment
Interpol
METAVERSE
Microsoft Security
CISO Workshop
ICELAND.EXE
MALWARE ANALYSIS
Cyber People
The major cyberattacks on the telecommunications sector in 2023
ISECT
Information risk catalogue
OECD Publishing
Confidentiality and Information Security Management Toolkit
ThreatRadar
Threat Intel Roundup: Jenkins, ScarCruft, Midnight Blizzard
ThreatRadar
Threat Intel Roundup: Anydesk, FortiSIEM, Ivanti, Mastodon
Saudi Aramco
Third Party Cybersecurity Standard
txOne networks
The Crisis of Convergence: OT/ICS Cybersecurity in 2023
Kubernetes
The Hidden Dangers in Kubernetes Clusters
CISA
The Mirai Botnet Phenomenon
iexpeerts
10 Cybersecurity Advices
Login Soft
Annual Report – Vulnerability Intelligence
IoT Security Institute
The IoTSI SCCI Framework
FAIR
The Essential Guide to Secure Al
CISA
The Art of Balancing Cybersecurity and Business Growth
CISA
Banking Cybersecurity: Zero Margin For Error
IGNITE Technologies
WORDLISTS FOR PENTESTER
IGNITE Technologies
Wireless Penetration Testing PMKID Attack
IGNITE Technologies
Wireless Penetration Testing Wifite
IGNITE Technologies
Wireless Penetration Testing SSID Discovery
IGNITE Technologies
Wireless Penetration Testing BETTERCAP
Hyperproof
2023 Proposed Changesto NIST CSF
SentinelOne
WATCHTOWER Intelligence-Driven Threat Hunting
U.S. Department of Defense
Department of Defense (DoD) Cybersecurity Reference Architecture
CISA
Unmask Hidden Cyber Threats with MITRE ATT&CK
IGNITE Technologies
A DETAILED GUIDE TO NMAP SCAN WITH WIRESHARK
CISA
Underestimating GDPR & PCI-DSSImpact?
Didomi
What is the most important data privacy trend in 2024?
Carnegie Mellon University
Introduction to Threat Hunting
Insikt Group
Informe de Amenazas a la Infraestructura
Centre for Cyber Security Belgium
Cyber Secutiry Incident Management Guide
Natural Resources Canada
IACS Cyber Security Incident Response Playbook
HR Top Priorities for 2024
FDPIC - Federal Data Protection and Information Commissioner
Guide to Technical and Organisational Data Protection
The Institute of Internal auditors
Global Internal Audit Standards 2024
Foresiet
Global Cyber Security Trends
CEDPO
Generative AI The Data Protection Implications
Cybervergent
Cybervergent Cybersecurity Annual Report
Cybersecurity Career Roadmap
Center for Cyber Security
Cyber Security in Supplier Relationships Guide
IGNITE Technologies
TRAINING PROGRAM {CAPTURE THE FLAG}
IBCG
Code of Best Practices of Corporate Governance
CSA Cloud Security Alliance
Cloud & Compromise Gamifying of Cloud Security
Cybersecurity & Infrastructure Security Agency
CISA Roadmap for Artificial Intelligence
REMORA
Bridging the Gap in Defence Against Phishing
IGNITE Technologies
Automated Privilege Escalation
INE
ABC DE PROTECCION DE DATOS PERSONALES
IGNITE Technologies
A Detailed Guide on Medusa
IGNITE Technologies
A Detailed Guide on Crunch
IGNITE Technologies
A Detailed Guide on Cewl
Petr Chalupnik
A Deep Dive into Reconnaissance
EC-council
Threat Landscape 2024
Thecyphere
10 Steps to Secure Kubernetes by Harman Singh
CISA
vCISO: The Future of Cybersecurity
HADESS
Top 10 Web Hacking Techniques 2023
OPENHUNTING
THREAT HUNTING MALWARE INFRASTRUCTURE
IGNITE Technologies
RED TEAM OPERATIONS – MITRE ATTACK
National Cyber Security Centre
The Scourge of Ransomware
Australian Government
Overview of CyberSecurity Obligations for Corporate Leaders
HADESS
Memory analysis for fun and profit
Threat Research
Layers of Deception: Analyzing the Complex Stages of XLoader Malware Evolution
Personal Data
Introduction to Cybersecurity
CyBok
Security Economics Knowledge Guide
ministry of security
A QUICK GUIDE TO INFORMATION SECURITY STANDARDS
Incibe
Industrial control systems end points defence guide
Cybersecurity & Infrastructure Security Agency
Incident Response Guide Water and Wastewater Sector
EDPB
Security of Processing and Data Breach Notification
NCSC
Dealing with risks in the supply chain
FFIEC
Cybersecurity Resource Guide for Financial Institutions
aws
Amazon web services
IGNITE Technologies
A DETAILED GUIDE ON
GENERATIVE AI FOR CYBERSECURITY
HADESS
Threat Intel Roundup: Gitlab, Juniper, MageCart, SystemBC
IGNITE Technologies
Credential Dumping
IGNITE Technologies
EASY WAY TO GENERATE REVERSE SHELL
IGNITE Technologies
RED TEAM
DevSecOps Guide
Devsecops Scenarios
ISACA
AUDITING ARTIFICIAL INTELLIGENCE
TLP.CLEAR
NIS 2 Directive and ISO 27001:2022
hacking
HYDRA A Detailed Guide
CD INSIDE
HACKING THE ART OF EXPLOITATION
USE CASES SECURE DNS
CYTAD
10 Cybersecurity New Year’s Resolutions for 2024
Cybersecurity career roadmap
IGNITE Technologies
Burpsuite for Pentester: Authorise
HADESS
Bitbucket Attack Vector
CISA
Equifax 2017: A Cybersecurity Cataclysm
creative commons
Awesome Bug Bounty Tools
AccessNow
A USER GUIDE TO DATA PROTECTION IN THE EUROPEAN UNION
SLOWMIST
Blockchain Security and Anti-Money Laundering Annual Report 2023
World Economic Forum
WEF Global Security Outlook Report 2023
MPSeDC
Secure Coding Guidelines for Application Development
Microsoft Security
Ransomware Incident Response Playbook Framework – Learn how to build a ransomware IR playbook to...
HADESS
Purple Team Scenarios
ZENITH
OT Cyber Security – Ensuring Business Resiliency in Life Sciences Manufacturing 4.0
NASA
NASA BPG RevA – Space Security: Best Practices Guide (BPG)
IBM
IBM SIEM Qradar Documentation
Green Circle
How to protect your identity
ComplyCloud
EU GDPR Casebook 2023
ESET
Cyber Threat Intelligence
Cybersecurity Career Roadmap 2024 – Cybersecurity Career Roadmap: Paving the Path to Cyber Excellence
IEC
Cyber Sec Resilience Guide Smart Energy Operat Environment
Homeland Security
CISA – IACS Defence-in-Depth Strategies
CARNEGIE
CEO-Level Guide and Checklist – Cybersecurity Leadership
Petr Chalupnik
BYOD Hidden Ransomware Threat
GLOBAL REGULATORY INSIGHTS
Advanced Cybersecurity Practices 2024
CIS
Acceptable Use Policy Template
Recorded Future
2023 Adversary Infrastructure Report
INSIDE CLOUD AND SECURITY
100 Free Cyber Security Tools
CYTAD
10 Cybersecurity New years resolutions for 2024
TLP.CLEAR
Privacy Toolkit (GDPR+ and ISO 27701)
CISO
Sony’s 2014 Hack: A Cybersecurity Lesson
C|SA
Security Operations and Management
National Cyber Security Centre
Security testing White Paper
V-Valley
Ciberataques 2024
CARNEGIE
Cloud Reassurance: A Framework To Enhance Resilience And Trust
CISO
Reporting Cyber Risk to Boards
cybersource
2023 Visa Merchant Fraud Report
HADESS
Credentialess / Username
Government of South Australian
South Australian CyberSecurity Framework
SOC ANALYST SERIES
CYBER SECURITY PROGRAMME
Detecting the Unknown: A Guide to Threat Hunting
OPENHUNTING
THREAT HUNTING MALWARE INFRASTRUCTURE
Cyberint Impactful Intelligence
TOP ASIA/APAC CYBERSECURITY THREATS OF 2023
IGNITE Technologies
Infra Pentest Course
SINTEF
Information security aspects of Industrial Control Systems
HADESS
Compression Methods
Security Innovation
IOS Hacking Guide
Tree of Attacks: Jailbreaking Black-Box LLMs Automatically
Kaspersky
Incident Response Play Book
CREST
Cyber Security Incident Response Guide
ISC2
Incident Response Business Continuity Disaster Recovery
HADESS
User Account Control / Uncontrol
WHITE PAPER
Using ISA/IEC 62443 Standards to Improve Control System Security
IntechOpen
Industry 4 0 Current Status and Future Trends
Web Application Penetration Testing
OWASP
Web Security Testing Guide v4.2
IGNITE Technologies
Windows Reverse Shell
Hillstone Networks
Hillstone ZTNA Solution
CLTC
Cybersecurity Futures 2030 New Foundations
Windows
Incident Response
PYCUS
HOW BREACH SIMULATION FITS INTO A MULTI LAYERED STRATEGY
onfido
Identity Fraud Report 2024
OWASP
Wireless Pentesting – CheatSheet
Google Cybersecurity Action Team
Handbook for Cloud Risk Governance
Lorenzo Visaggio
hacking the infrastructure UPGRADE Visaggio
World Privacy Forum
Risky Analysis
ThreatRadar
Threat Intel Roundup: CrushFTP, CS2, Lazarus, Trigona
ThreatRadar
Threat Intel Roundup: WebKit, Akira, Kimsuky
National Cybersecurity Authority
Guide to ECC Implementation
Google Cloud
Cybersecurity Forecast 2024 – Insights for Future Planning
GAO
Report to the Chairman, Committee on Homeland Security and Governmental
RESPONSUM
First 100 days of making impact as a DPO
IGNITE Technologies
Firefox Addons for Pentesting
Kaspersky
Financial Cybersecurity Predictions for 2024
G. M. Faruk Ahmed
File Integration Monitoring FIM Security Audit
ENISA
ENISA – PANORAMA DE AMENAZAS DOS
ministry of security
DPDP ACT 23
Chris Bevil
Building a Future-Ready Defense – Don’t Role the Dice: The Crucial Role of Information Security...
HADESS
Devsecops Security Model
W W W . D E V S E C O P S G U I D E S . C O M
DevSecOps Scenarios
W W W . D E V S E C O P S G U I D E S . C O M
DevSecOps Pipelines
Identifying and Protecting Assets Against Data Breaches
CROWDSTRIKE
NOWHERE TO HIDE
DLA PIPER
DATA PROTECTION LAWS OF THE WORLD
Cybe FIT
Data Disposal Myths
HADESS
DA Bomb
CYZEA.IO
Enterprise Information Security
GDPR compliance
The representative in the European Union according to Art. 27 GDPR
CYTAD
Cybersecurity resolutions for 2024
ISECOM
OSSTMM 3 – The Open Source Security Testing Methodology Manual
U.S. Embassy Suva
Cybersecurity Open Source Tools
Dr. Mohammed Al Hunaidi
Cybersecurity in the UAE Public Sector
Barkly
THE OPEN SOURCE CYBERSECURITY PLAYBOOK
Cybersecurity Futures 2030
Rohit Srivastwa
Cybersecurity for Startups
GAO
Cybersecurity Audit Guide
FORTINET
The Fortinet Security Fabric: Cybersecurity, Everywhere You Need It
exabeam
The ESSENTIAL GUIDE TO SIEM
Compliance Forge
Cybersecurity & Data Privacy Risk Management Model (CP-RMM) Overview
CyberProof
MITRE PLAYBOOK – Understanding Today’s Threat Landscape Using MITRE ATACK Frameworks
Cyber Security Obligations for Corporate leaders
Australian Government
Cyber Security Governance Principles
NATIONAL SECURITY COUNCIL SECRETARIAT
CYBER SECURITY AUDIT BASELINE REQUIREMENTS
Joas A Santos
Cyber SecurityCareer in 2024
ministry of security
Decoding Cyber Attacks
Cybersecurity and Infrastructure Security Agency
TRAINING PROGRAM CAPTURE THE FLAG
Cybersecurity and Infrastructure Security Agency
Critical Infrastructure Resources
Ra-Ma
Criptografía sin secretoscon Python
Ra-Ma
CRACKING SIN SECRETOS
OMDIA
Consumer IoT Device Cybersecurity Standard
CompTIA
662 CompTIA A+ Core 1Practice Questions & Answers Overview
Treadstone 71
Cloud-Based FINTECH Cyber Threats
CCSK
The Security Guidance for Critical Areas of Focus in Cloud Computing
Gartner
The CISO’sGuide to YourFirst 100 Days
Cybersecurity and Infrastructure Security Agency
CISA ROADMAP FOR ARTIFICIAL INTELLIGENCE
White Label Consultancy
Catalogue of security measures GDPR
IGNITE Technologies
Web ApplicationPenetration TestingTraining
Digital Directors Network
Boardroom Guide on Cybersecurity Governance and SEC info
BCG
The Art of Risk Management
HADESS
The art of Linux persistence
Harvard Business Review
Insights You Need from Harvard Business Review
National Cyber Security Centre a Part of the GCSB
SUPPLY CHAINCYBER SECURITY.
HADESS
SMART CONTRACT SECURITY AUDIT
ipsos
HUMANIZING AI
OASIS OPEN
Security Playbooks Version 2.0
BDO
RCE تا XSS از (RCE from to XSS)
OWASP
Secure Coding Practices
ministry of security
SECURE CODING GUIDELINES
Federal Ministry for Economic Affairs and Energy
Security Standards White Paper for Sino-German Industrie 4.0/Intelligent Manufacturing
Compliance Forge
Cybersecurity & Data Privacy Risk Management Model (C|P-RMM) Overview
Secure Controls Framework
SECURE CONTROLS FRAMEWORK (SCF) OVERVIEW & INSTRUCTIONS
FUTURE OF PRIVACY FORUM
RISK FRAMEWORK FOR BODY-RELATED DATA IN IMMERSIVE TECHNOLOGIES
HADESS
RedTeam scenarios
Kaspersky
Redefining the Human Factor in Cybersecurity
NIST
Recovering from a Cybersecurity Incident
Azure Penetration Testing Guide
VicOne
Automotive Cyberthreat
D E V S E C O P S G U I D E S
Attack Against Google Cloud Native App
SEK (Security Ecosystem Knowlege)
ARP Spoofing: Protegiendo-se contra interseptaçã de datos sensíveis
IGNITE Technologies
Process Ghosting Attack
CISA | Cybersecurity and Infrastructure Security Agency
Physical Security Performance Goals for Faith-Based Communities
Controlplane
Argo CD End User Threat Model
T H R E A T R A D A R
APT Report 2023
PCI Security Standars Council
PCI DSS v4.x: Targeted Risk Analysis Guidance
DevSecOps Guide
OWASP API Security Top 10 2023
CCN Español
Aproximación a laInteligencia Artificialy la ciberseguridadINFORME DE BUENAS PRÁCTICAS
Peter Ferrie
Anti-Reverse – The “Ultimate”Anti-Debugging Reference
SANS Summnits
OSINT Tools for diving deep in to the Dark Web
Insikt Group
Annual Payment Fraud Intelligence Report 2023
HADESS
Android Shim Attack Surface
CYENTIA INSTITUTE
Anatomy of 100 Cybersecurity Incidents in Industrial Op
G. M. Faruk Ahmed
Top 25 Cybersecurity Frameworks
ministry of security
All About Phishing
AGI (ARTIFICIAL GENERAL INTELLIGENCE) UNLEASHED: CYBERSECURITY’S NEW FRONTIER
IGNITE Technologies
Active Directory Pentest Course
IGNITE Technologies
A Detailed Guide on AMSI Bypass
2023 Türkiye Email Security Landscape Report
ENZOIC
2023 Authentication Report Enzoic final
McAfee
200 IT Security Job Interview QuestionsThe Questions IT Leaders Ask
IEC
Great Cybersecurity Frameworks
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS