Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Australian Government
ACN
Guidelines for secure AI system development
This document recommends guidelines for providers of any systems that use artificial intelligence (AI), whether those...
Australian Government
Enhanced CyberSecurity Obligations
Incident Response Planning The document outlines the requirements and guidelines for incident response planning in the...
Australian Government
Management structures and responsibilities
The Protective Security Policy Framework outlines the management structures and responsibilities necessary for making security decisions...
ACSC Australia
Identifying and Mitigating Living Off the Land Techniques
The document provides comprehensive guidance on Living Off The Land (LOTL) techniques and network defense weaknesses,...
Australian Government
Overview of CyberSecurity Obligations for Corporate Leaders
Leadership in cyber security governance The complex and evolving risk of cyber incidents presents serious security...
Australian Government
Cyber Security Governance Principles
Cyber threats are part of every organisation’s risk landscape, particularly as businesses place more of their...
Australian Government
2023–2030 Australian Cyber Security Strategy
By 2030, Australia will be a world leader in cyber security.We envisage a future where stronger...
Australian Government
Critical Infrastructure Annual Risk Review
The first edition of CISC’s Critical Infrastructure Annual Risk Review provides a summary of the key...
Australian Government
Business Continuity in a Box
Business Continuity in a Box – developed by the Australian Signals Directorate’s Australian Cyber Security Centre...
Australian Government
Essential Eight Maturity Model Nov 2023
The Australian Signals Directorate (ASD) has developed prioritised mitigation strategies, in the form of the Strategies...
Latest News
The Register Security
Oops, some of our customers’ Power Pages-hosted sites were exploited, says Microsoft – Source: go.theregister.com
20/02/2025
The Register Security
US minerals company says crooks broke into email and helped themselves to $500K – Source: go.theregister.com
20/02/2025
The Register Security
Critical flaws in Mongoose library expose MongoDB to data thieves, code execution – Source: go.theregister.com
20/02/2025
The Register Security
Two arrested after pensioner scammed out of six-figure crypto nest egg – Source: go.theregister.com
20/02/2025
The Register Security
Ghost ransomware crew continues to haunt IT depts with scarily bad infosec – Source: go.theregister.com
20/02/2025
The Register Security
Medusa ransomware gang demands $2M from UK private health services provider – Source: go.theregister.com
20/02/2025