cissp | Unsorted

Telegram-канал cissp - cissp

16255

@cissp International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course - - - - - - - - - - +also group: https://t.me/cisspgroup ————————— @alirezaghahrood

Subscribe to a channel

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Cybersecurity with Diyako Secure Bow’s Compass
In today’s complex and dynamic digital world, cybersecurity serves as a guiding compass for navigating organizations toward safety and resilience. At Diyako Secure Bow, we have distilled this approach into a comprehensive framework focusing on three key stages:
1. pre-incident preparedness,
2. incident response,
3. post-incident recovery.
This framework is built on years of experience in executing national and international projects, from managing cyber crises in critical infrastructures to advanced threat analysis and practical solutions for digital resilience.

Our mission is to empower organizations to tackle cybersecurity challenges through threat analysis, infrastructure reinforcement and workforce training.

Every incident is a learning opportunity and at Diyako Secure Bow, we are dedicated to fostering a strong culture of security within organizations.

امنیت سایبری با قطب‌نمای کمان امن دیاکو
در جهان پیچیده و پویای دیجیتال امروز، امنیت سایبری به‌عنوان یک قطب‌نما برای هدایت سازمان‌ها به سمت ایمنی و تاب‌آوری عمل می‌کند. در کمان امن دیاکو، این رویکرد را به یک چارچوب جامع تبدیل کرده‌ایم که بر سه مرحله اصلی استوار است:
1. آمادگی پیش از وقوع حوادث،
2. مدیریت بحران در هنگام حادثه،
3. و بازیابی و بهبود پس از حادثه.
این چارچوب نتیجه سال‌ها تجربه در اجرای پروژه‌های ملی و بین‌المللی، از مدیریت بحران‌های سایبری در زیرساخت‌های حیاتی گرفته تا تحلیل‌های پیشرفته و ارائه راهکارهای عملی برای تاب‌آوری دیجیتال است

هدف ما این است که با ترکیب تحلیل تهدیدها، تقویت زیرساخت‌ها و آموزش نیروی انسانی، سازمان‌ها را برای مقابله با چالش‌های امنیت سایبری توانمند سازیم

هر حادثه فرصتی برای یادگیری و بهبود است و ما در کمان امن دیاکو همواره به دنبال تقویت فرهنگ امنیت در سازمان‌ها هستیم

-Secure Business Continuity-
2024.12.30
——————————————————
#CyberSecurity #vCISO #CSF
#BCP #DRP #ISO22301
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_diyakosecurebow-cybersecurity-vciso-activity-7279520426286813184-VfmM?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

Research
Hardware Security
"Hardware Designs for Secure Microarchitectures".


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

Tech book
"Machine Learning Security Principles:
Keep data, networks, users, and applications safe from prying eyes", 2022.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

Whitepaper
Blue Team Techniques
Never Trust, Always Verify: Effectiveness of Endpoint Detection and Response Tools Versus Zero Trust Endpoint Controls in Enterprise Environments", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

Tech book
IDS and IPS with Snort 3:
Get up and running with Snort 3 and discover effective solutions to your security issues", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

DFIR
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

SEC Cybersecurity Incident Disclosure Report:
Imagine a 60% rise in cyber incidents since new SEC rules.This report dives deep into 75 disclosures from 48 companies (December 2023 and October 2024).

↳ Key Insights:
• Less than 10% described the material impact.
• 78% disclosed within eight days, with 42% updating their Form 8-K.
• One in four breaches were third-party incidents.
• Threat actors used SEC rules as extortion tactics, even submitting whistleblower reports.

↳ Authors analyzed these disclosures, focusing on:
• Information disclosed about Cybersecurity Incidents.
• Methods of disclosure to the SEC.
• Future compliance strategies.

↳ Key Findings:
• 75% of incidents notified law enforcement.
• 13% included press releases or blog references.
• 42% filed multiple disclosures for the same incident.

↳ Timing of Disclosures:
• 32% within four days of discovery.
• 78% within eight days.

↳ Examples of Material Impact:
• Bassett Furniture Industries: Business operations affected.
• Sonic Automotive: Quarterly results impacted.
• First American Financial: Fourth-quarter operations affected.

↳ Industries Affected:
• Financial Services
• Healthcare
• Retail
• Technology

↳ Recommendations:
• Evaluate and test disclosure controls.
• Prepare for SEC enforcement actions.

Special Thanks❤️😇👍🏽🙏
Sherrese Smith
Aaron Charfoos, CIPP US
Jeremy Berkowitz
@Michelle Reed
@Dave Coogan

-Secure Business Continuity-
2024.12.30
——————————————————
#CyberSecurity #vCISO #CSF #Incidents
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_cybersecurity-incident-disclosure-report-activity-7279381883124088833-Kr7x?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Introduction & Synopsis:
Welcome to the 9th edition of the Edgescan
Vulnerability Stats Report 2024.

This report demonstrates the state of full stack
security based on thousands of security assessments
and penetration tests on millions of assets that were
performed globally from the Edgescan Cybersecurity
Platform in 2023. This is an analysis of vulnerabilities detected in the systems of hundreds of organizations across a wide range of industries – from the Fortune 500 to medium and small businesses. The report provides a statistical model of the most common weaknesses faced by organizations to enable data-driven decisions for managing risks and exposures more effectively.

We hope this report will provide a unique
by-the-numbers insight into trends, statistics and
a snapshot of the overall state of cybersecurity for
the past year, from the perspective of vulnerabilities
discovered and remediated, as well as penetration
testing success rates. We are proud that this yearly report has become a reliable source for approximating the global state of vulnerability management. This is exemplified by our unique dataset being part of the Verizon Data Breach Investigations Report (DBIR), which is the de facto standard for insights into the common drivers for incidents and breaches today.

This year we delve into Risk Density to describe
where critical severity vulnerabilities and exposures
are clustered in the IT technical stack, quantification
of attack surface management exposures and
risks, and Mean Time To Remediate (MTTR) critical
vulnerabilities.

Special Thanks❤️😇👍🏽🙏
Edgescan

-Secure Business Continuity-
2024.12.015
——————————————————
#CyberSecurity #vCISO #Vulnerability #Hardening
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_open-2024-vulnerability-report-activity-7273931272748494848-6iB2?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Hardening
Enhanced Visibility and Hardening Guidance for Communications Infrastructure 2024.:

Network Infrastructure Security Guide, ver.1.2
https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF

Cisco Guide to Securing NX-OS Devices
https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html

Cisco IOS XE Hardening Guide, 2024
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html

Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
National Security Agency
National Cyber Security Centre
@canadian centre for cyber Security
Australian Signals Directorate
Cybersecurity and Infrastructure Security Agency

-Secure Business Continuity-
2024.12.04
——————————————————
#CyberSecurity #vCISO #CISA #Hardening
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_ev-hardening-guide-2024-activity-7269914274351730688-D9Gt?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

Techbook
CloudSecurity
Cloud Hacking Playbook 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
‎2024.12.03

Читать полностью…

cissp

Techbook
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.

Special Thanks❤️🙏😇👍🏽
ZHUSSUPOV ZHASSULAN
(COCOMELONC)


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
‎2024.12.03

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Research
Offensive Security
AI-Augmented Ethical Hacking:
A Practical Examination of Manual Exploitation and Privilege Escalation in Linux Environments 2024.

Special Thanks❤️😇👍🏽🙏
Haitham S. Al-Sinani and Chris J. Mitchell
1 Department of Cybersecurity and Quality Assurance, Diwan of Royal Court,
Muscat, Oman.
2 Department of Information Security, Royal Holloway, University of London,

-Secure Business Continuity-
2024.12.03
——————————————————
#CyberSecurity #vCISO #Hacking #Ethical
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_ethical-hacking-gen-ai-2024-activity-7269624361907625984-unMU?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

Research
Offensive security
AI-Augmented Ethical Hacking:
A Practical Examination of Manual Exploitation and Privilege Escalation in Linux Environments", 2024.

اون قسمتی از وجودم که مدارا رو انتخاب میکرد از بین رفته، دیگه نمیتونم هر طور شده آدم‌ها رو کنار خودم نگه دارم حتي در قبال مشتري و دوست...، بگذريم؛
وَ من..؟مصمم؛در سبز زیستن
در آدمِ بهتری بودن و آدم بهتری شدن! حتي اگر چرخه جاري زندگي شايد هيچ عدل و منطقي هم همراش نباشد و وعده انتظار دنياي بهتر بعد از زندگي صرفا از خاك بودن و به خاك برگشتن باشد.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
‎2024.12.02

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

The State of aUtomotive CyBerSecurity

Special Thanks❤️😇👍🏽🙏
Pavel Khunt
Thomas Sermpinis
Auxilium Pentest Labs
@troopers sec

-Secure Business Continuity-
2024.11.29
——————————————————
#CyberSecurity #vCISO #Automotive #ASM
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_cybersecurityautomotive-2024-activity-7268033641555873794-jFiT?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Principles of operational technology cyber security:
Principle 1: Safety is paramount.
Principle 2: Knowledge of the business is crucial.
Principle 3: OT data is extremely valuable and needs to be protected.
Principle 4: Segment and segregate OT from all other networks.
Principle 5: The supply chain must be secure.
Principle 6: People are essential for OT cyber security.

Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
National Security Agency
National Cyber Security Centre
Federal Bureau of Investigation (FBI)
Australian Signals Directorate
This publication was developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) in collaboration with the U.S. Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), United Kingdom’s National Cyber Security Centre (NCSC-UK), Canadian Centre for Cyber Security (Cyber Centre), New Zealand’s National Cyber Security Centre (NCSC-NZ), Germany’s Federal Office for Information Security (BSI Germany), the Netherlands’ National Cyber Security Centre (NCSC-NL), Japan’s National Center of Incident Readiness and Strategy for Cybersecurity
(NISC) and National Police Agency (NPA), and the Republic of Korea’s National Intelligence Service (NIS) and NIS’ National Cyber Security Center (NCSC)

-Secure Business Continuity-
2024.11.26
——————————————————
#CyberSecurity #vCISO #OT #Scada
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_principles-of-operational-technology-cybersecurity-activity-7267279078544605186-5NhW?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

Tech book
"Practical Linux Security Cookbook.
Second Edition.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

Tech book
"Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

MLSecOps
Tech book
"The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

SCADA Security
False Data Injection Attacks Against Distribution Automation Systems", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

MLSecOps
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

DevOps
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.12.31

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

False Data Injection Attacks Against Distribution
Automation Systems

Author: Ryan McAndrews
Advisor: Clay Risenhoover
Accepted: 2024

Utility companies increasingly rely on automated switching to provide their customers with a reliable electric power supply. These automation systems, which offer significant operational benefits for the utility, also present a growing security risk.

With adequate knowledge of the function of these automation systems and their algorithms, an adversary could implement false data injection to amplify or hide real issues that these automation systems solve.

An adversary would be challenging to detect without authentication, auditing, or appropriately logged field data. Researchers have proposed these attacks theoretically, and this research intends to evaluate claims of unidentifiable false data
injection attacks experime

Special Thanks❤️😇👍🏽🙏
Ryan McAndrews
Clay Risenhoover

-Secure Business Continuity-
2024.12.21
——————————————————
#CyberSecurity #vCISO #Attack #OT
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_fdia-2024-cybersecurity-activity-7275977183137792000-K2kt?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

At Diyako Secure Bow, we believe that knowledge-sharing is the cornerstone of advancing cybersecurity and building trust within the industry. That’s why we’re proud to launch our newsletter, a platform to provide valuable insights, practical strategies, and the latest innovations in the field of cybersecurity.

The purpose of this newsletter is to bridge the gap between technical security concepts and organizational needs, empowering businesses to tackle cybersecurity challenges with confidence. Each edition focuses on key topics that highlight our expertise and commitment to enhancing the resilience and success of organizations.

This edition of our newsletter takes you beyond the traditional view of Security Operations Centers (SOCs) to explore a transformative approach to cybersecurity operations. We examine how strategic thinking, enhanced processes, and innovative solutions can elevate security from a reactive function to a proactive enabler of organizational trust and resilience. Dive into our insights on reducing vulnerabilities, fostering quality systems, and redefining the essence of security in today’s digital landscape.

ما در شرکت کمان امن دیاکو بر این باوریم که اشتراک دانش، زیربنای پیشرفت در حوزه امنیت سایبری و ایجاد اعتماد در صنعت است. به همین دلیل، با افتخار روزنامه(گاهنامه) دیجیتال خود را راه‌اندازی کرده‌ایم؛ بستری برای ارائه بینش‌های ارزشمند، استراتژی‌های کاربردی و آخرین نوآوری‌ها در حوزه امنیت سایبری. هدف این گاهنامه دیجیتال، ایجاد پلی بین مفاهیم فنی امنیت و نیازهای سازمانی است تا به کسب‌وکارها در مقابله با چالش‌های امنیت سایبری، با اعتمادبه‌نفس بیشتری کمک کند. هر شماره بر موضوعات کلیدی تمرکز دارد که تخصص و تعهد ما را در تقویت پایداری و موفقیت سازمان‌ها برجسته می‌کند

برای انتقال شکاف موجود، از سال 1390 و اولین و بزرگترین پروژه امنیت سایبری در دهه گذشته با محوریت مرکز عملیات امنیت و پاسخدهی به حملات سایبری که شامل تحلیل و کنترل ترافیک ورودی و خروجی کشور و نقاط توزیع شده بود، تجربه شخصی من در این حوزه شروع شد. امروز، پس از گذشت ۱۴ سال از فعالیت در این مراکز، همچنان شاهد کمبودهایی در بهره‌برداری موثر از مراکز عملیات امنیت در کشور هستیم

این مراکز اغلب به جای مدیریت جامع تهدیدات بر مبنای رویدادها و هوشمندسازی فرآیندها، به مدیریت تهدیدات محدود شده‌اند. در بسیاری از ممیزی‌های فنی و سیستمی، چه در بخش بانکی، دولتی، و چه خصوصی، بیش از ۶۵ تا ۷۰ درصد انحراف از معیار وجود داشته است. با این حال، نمی‌توان تنها به داشتن یک فناوری مثل اسپلانک با افزونه‌های
مرتبط به‌عنوان یک مرکز عملیات امنیت حتی حداقلی اتکا کرد، فارغ ار اخلاقیات رنگ باخته

رویکرد صحیح در مراکز عملیات امنیت باید شامل تمامی جنبه‌های عملیاتی مانند
سیاست‌گذاری، ممیزی، نظارت، و کنترل‌های پیشگیرانه از ابتدا تا انتها باشد. تمرکز صرف بر شکار تهدیدات بدون توجه به کنترل‌های پیشگیرانه کامل، تنها به پروژه‌های انتقال پول و اهداف محدود ختم می‌شود و منجر به کاهش کیفیت در اجرای پروژه‌ها خواهد شد. هدف ما باید ایجاد مراکزی باشد که به صورت یکپارچه و هماهنگ تمامی جنبه‌های امنیتی را مدیریت کنند و موجب ارتقای کیفی و ساختاری امنیت سازمانی شوند

@CisoasaService
‎2024.12.13

https://www.linkedin.com/posts/alirezaghahrood_at-diyako-secure-bow-we-believe-that-knowledge-sharing-activity-7273287519998214144--VTs?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

Whitepaper
ThreatResearch
eBPF Security Threat Model 2024.

eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
‎2024.12.03

Читать полностью…

cissp

DFIR
Techbook
A Practical Hands-on Approach to Database Forensics.


-Cyber Security awareness-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
‎2024.12.03

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Infosec Standards
NIST SP 800-63B-4:
"Digital Identity Guidelines. Authentication and Authenticator Management", August 2024.

NIST SP 800-63-4:
"Digital Identity Guidelines"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.2pd.pdf

NIST SP 800-63A-4:
"Identity Proofing and Enrollment"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63A-4.2pd.pdf

NIST SP 800-63C-4:
"Federation and Assertions"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63C-4.2pd.pdf

Special Thanks❤️😇👍🏽🙏
National Institute of Standards and Technology (NIST)

-Secure Business Continuity-
2024.12.03
——————————————————
#CyberSecurity #vCISO #NIST #AAA
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_nist-800-63-activity-7269639297606066176-yG5p?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

https://www.linkedin.com/posts/alirezaghahrood_research-offensive-security-ai-augmented-activity-7269301844361814017-JyUe?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

CISA ROADMAP FOR ARTIFICIAL INTELLIGENCE

As noted in the landmark Executive Order 14110, “Safe, Secure, And Trustworthy Development and Use of Artificial Intelligence (AI),” signed by the President on October 30, 2023, “AI must be safe and secure .” As the nation’s cyber defense agency and the national coordinator for critical infrastructure security and resilience, CISA will play a key role in addressing and managing risks at the nexus of AI, cybersecurity, and critical infrastructure .

This “2023–2024 CISA Roadmap for Artificial Intelligence” serves as a guide for CISA’s AI-related
efforts, ensuring both internal coherence as well as alignment with the whole-of-government AI strategy . This roadmap incorporates key CISA-led actions as directed by Executive Order, along with additional actions CISA is leading to promote AI security and support critical
infrastructure owners and operators as they navigate the adoption of AI .
The roadmap includes CISA’s efforts to:
• Promote beneficial uses of AI to enhance cybersecurity capabilities and other aspects of CISA’s mission;
• Protect the nation’s AI systems from cybersecurity threats; and
• Deter malicious actors’ use of AI capabilities to threaten critical infrastructure .

The security challenges associated with AI parallel cybersecurity challenges associated with previous generations of software that manufacturers did not build to be secure by design, putting the burden of security on the customer . Although AI software systems might differ from traditional forms of software, fundamental security practices still apply . Thus, CISA’s AI roadmap
builds on the agency’s cybersecurity and risk management programs . Critically, manufacturers
of AI systems must follow secure by design principles: taking ownership of security outcomes for customers, leading product development with radical transparency and accountability, and making secure by design a top business priority . As the use of AI grows and becomes
increasingly incorporated into critical systems, security must be a core requirement and integral to AI system development from the outset and throughout its lifecyc

Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
Cybersecurity and Infrastructure Security Agency

-Secure Business Continuity-
2024.11.29
——————————————————
#CyberSecurity #vCISO #CISA #AI
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_cisa-roadmap-4-ai-2024-activity-7268036739653410816-2riB?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

White Paper
General Quarters!
Cybersecurity Challenges in the Maritime Industry
October 2024

Special Thanks❤️😇👍🏽🙏
Marco (Marc) Ayala
Jason Murrell
Sean Plankey
SANS Institute
SANS ICS
Fortinet

-Secure Business Continuity-
2024.11.29
——————————————————
#CyberSecurity #vCISO #OT #Scada
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_ot-cybersecurity-by-sansfortinet-2024-activity-7268030353045397508-3oTP?utm_source=share&utm_medium=member_ios

Читать полностью…

cissp

#DiyakoSecureBow
————————————
CISO as A Service (vCISO)

Introduction
SPECIAL REPORT
MANDIANT M-TRENDS:
When looking at the year ahead, we never make predictions. Instead, we look at the trends we are already seeing, and provide realistic forecasts of what we expect to see in the wide world of cybersecurity. The Cybersecurity Forecast 2025 report is filled with forward- looking insights from Google Cloud security leaders.

The report also features insights from more than a dozen
researchers, analysts, responders and experts across
numerous Google Cloud security teams, including Google
Threat Intelligence, Mandiant Consulting, Google Security
Operations, Google Cloud’s Office of the CISO, and VirusTotal. These individuals are regularly on the frontlines, and know what organizations and security teams should be prioritizing next year. Technology advances, threats evolve, the cybersecurity
landscape changes, and defenders must adapt to it all if they want to keep up.

The Google Cloud Cybersecurity Forecast 2025
report aims to help the cybersecurity industry frame its fight against cyber adversaries in 2025

Special Thanks❤️😇👍🏽🙏
Google
Mandiant (part of Google Cloud)
Google Cloud
Google Research
Google Cloud Security

-Secure Business Continuity-
2024.11.26
——————————————————
#CyberSecurity #vCISO #Google #adversaries
#SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_cybersecurity-forecast-2025-activity-7267272871096242176-Twc8?utm_source=share&utm_medium=member_ios

Читать полностью…
Subscribe to a channel