Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Microsoft
CVE
September Patch Tuesday handles 81 CVEs – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn .Microsoft on Tuesday announced 81 patches affecting 15 product families....
Bug
August Patch Tuesday includes blasts from the (recent) past – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn Microsoft on Tuesday announced 109 patches affecting 16 product families....
Microsoft
GDPR & Generative AI
The use cases for generative Al in the public sector present an exciting opportunity to improve...
Edelman
INCIDENT RESPONSE REFERENCE GUIDE
The Incident Response Reference Guide is a comprehensive document spanning 43 pages, offering detailed insights and...
Microsoft
Network Security Groups
The document provides detailed guidance on managing Network Security Groups (NSGs) in Azure for effective network...
Edelman
Incident Response Reference Guide
Many organizations will experience a major incident or must respond to difficult questions about preventing, detecting,...
HornetSecurity
MICROSOFT 365 SECURITY CHECKLIST
A PRACTICAL GUIDE FOR THE TIME-STRAPPED ADMIN There used to be a saying in the SMB...
Microsoft
Data Governance Building a Roadmap for Trusted Data
In many companies today, data governance has become increasingly important but what exactly is it? What...
EKCO
Office 365 Secure Configuration Framework
The National Cyber Security Centre (NCSC), in coordination with Microsoft and Ekco, have developed this Secure...
Microsoft
Awesome Azure Penetration Testing
In a world where cloud migration has become the norm, data and system security has become...
EKCO
Office 365 Secure Configuration Framework
The National Cyber Security Centre (NCSC), in coordination with Microsoft and Ekco, have developed this Secure...
Microsoft
Zero Trust Business Plan
Digital transformation is shaping the new normal Organizations are embracing digital transformation to manage continuous business...
Microsoft
Windows forensic Commands
In the field of forensic computing, the ability to use efficient commands in Windows systems is...
Microsoft
Microsoft – Defending Ukraine: Early Lessons from the Cyber War
Defending-Ukraine-??-PDFDescarga
Microsoft
Microsoft Zero Trust Maturity Model
AbstractIn this document, we will share guiding principles for implementing a Zero Trust security model and...
Microsoft
Microsoft 365 and the NIST Cybersecurity Framework
IntroductionKeeping your employees and organization secure without compromising productivity is a challenge.Microsoft 365 security solutions are...
Microsoft
Microsoft Azure Resiliency – Business Continuity and Disaster Recovery
AbstractThis document focuses on the resiliency aspect of Azure. It provides guidance on designingresilient applications on...
Microsoft
Protecting critical Infrastructure against cyber threats – An analysis of relevant regulation, good practices, international law and norms.
IntroductionCritical infrastructure and related essential services lie at the core of our societies. They increasingly rely...
Microsoft
Microsoft Cyber Signal Report August 2022 edition – Extortion Economics – Ransomware´s new business model – You Must Read !!
Cybercriminals emboldened by underground ransomware economy. While ransomware continues to be a headline-grabbing topic, there’s ultimately...
Microsoft
Microsoft_Azure_Active_Directory_Data_Security_Considerations by Microsoft
IntroductionThis document explains the following aspects of Azure Active Directory:• Azure AD Components: What are the...
Microsoft
Windows 11 Security Book – Powerful security from chip to cloud – Built with zero-trust principles at the core to safeguard data and access anywhere, keeping you protected and productive.
IntroductionThe acceleration of digital transformation and the expansion of both remote and hybridworkplaces brings new opportunities...
Latest News
The Hacker News
Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage – Source:thehackernews.com
12/09/2025
The Hacker News
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories – Source:thehackernews.com
12/09/2025
Krebs On Security
Bulletproof Host Stark Industries Evades EU Sanctions – Source: krebsonsecurity.com
12/09/2025
securityweek.com
Critical Chrome Vulnerability Earns Researcher $43,000 – Source: www.securityweek.com
12/09/2025
securityweek.com
100,000 Impacted by Cornwell Quality Tools Data Breach – Source: www.securityweek.com
12/09/2025
CSO - Online
Microsoft under fire: Senator demands FTC investigation into ‘arsonist selling firefighting services’ – Source: www.csoonline.com
11/09/2025