The Inner Circle

 View Only

1 to 50 of 895 threads (1.7K total posts)
  Thread Subject Replies Last Post Status
How to handle Vulnerable Docker Official Image
0 an hour ago by Ricci Ieong
NSA CSA Protecting VSAT Communications
0 13 hours ago by Michael Roza
NIST Special Publication (SP) 800-53A Revision 5, Assessing Security and Privacy Controls in Information Systems and Organizations
0 14 hours ago by Michael Roza
#TechTopicTuesday 0 17 hours ago by Orbert
CISA Publishes Infographic on Layering Network Security Through Segmentation
0 yesterday by Michael Roza
Publication Peer Review: C-Level Guidance to Securing Serverless Architectures 0 yesterday by Orbert
ISO/IEC/IEEE 26514:2022 Systems and software engineering - Design and development of information for users
0 3 days ago by Michael Roza
Artificial Intelligence in Healthcare 0 4 days ago by Orbert
NSA CTR Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment
0 5 days ago by Michael Roza
DISA / Department of Defense Cloud Computing Security Requirements Version 1 R4
0 5 days ago by Michael Roza
CISA INTERNET PROTOCOL VERSION 6 CONSIDERATIONS FOR TRUSTED INTERNET CONNECTIONS 3.0
0 5 days ago by Michael Roza
The Quest for Multi-Party Recognition 0 5 days ago by Orbert
ENISA Digital Identity: Leveraging the SSI Concept to Build Trust
0 5 days ago by Michael Roza
ENISA Remote Identity Proofing - Attacks & Countermeasures
0 6 days ago by Michael Roza
President Biden Signs National Security Memorandum to Improve the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems
0 6 days ago by Michael Roza
A Conversation on Digital Transformation
0 6 days ago by Orbert
5G PPP Starter Kit Basic Testing Guide r5
0 7 days ago by Michael Roza
FedRAMP CSP Authorization Playbook Version 2.0
0 7 days ago by Michael Roza
#TechTopicTuesday 0 7 days ago by Orbert
Hold Your Own Key (HYOK) vs Bring Your Own Key (BYOK)
1 8 days ago by Paul Rich
Original post by Anonymous Member
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 0 8 days ago by Orbert
FedRAMP issues Moderate and High Readiness Report Templates and Readiness Assessment Report Guide
0 11 days ago by Michael Roza
Virtual Events & CloudBytes Webinars 0 11 days ago by Orbert
ENISA Compendium of Risk Management Frameworks with Potential Interoperability
0 12 days ago by Michael Roza
NIST.SP.800-106, Randomized Hashing for Digital Signatures for Comment
0 12 days ago by Michael Roza
SECtember - DevSecOps and Zero Trust Architecture 0 12 days ago by Orbert
EU Water Security Plan - Implementation Manual for Drinking Water Systems
0 13 days ago by Michael Roza
NIST.SP.800-22r1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Proposal to Review Comments
0 13 days ago by Michael Roza
CSA Security Update 0 13 days ago by Orbert
How did you end up in cybersecurity?
4 14 days ago by Elisa Morrison
NISTIR 8349: Methodology for Characterizing Network Behavior of Internet of Things Devices for Comment
0 14 days ago by Michael Roza
CCSK badge 0 14 days ago by Orbert
JCA Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
0 14 days ago by Michael Roza
NIST SP 800-160 Volume 1, Engineering Trustworthy Secure Systems for Comment
0 14 days ago by Michael Roza
#TechTopicTuesday 0 14 days ago by Orbert
ISO/IEC 27013:2021 Information security, cybersecurity and privacy protection - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
5 15 days ago by JOHN DIMARIA
Original post by Michael Roza
FDA Issues Draft Guidance on 506J Notifications for Medical Devices
0 15 days ago by Michael Roza
Open Peer Review - Rapid Approachable Steps to Address the Manufacturing Industry Cybersecurity Challenges 1 15 days ago by Stan Mierzwa
Original post by Orbert
Towards a Zero Trust Architecture 0 15 days ago by Orbert
Compilation of Crypto News published in January 2022
0 17 days ago by Dr. Dhananjoy Dey
Software-Defined Perimeter (SDP) and Zero Trust 1 19 days ago by Michael Chacksfield
Original post by Orbert
Peer Review: State of ICS Security in the Age of Cloud 0 19 days ago by Orbert
#TechTopicTuesday 0 21 days ago by Orbert
NISTIR 8389, Cybersecurity Considerations for Open Banking Technology and Emerging Standards for Comment
0 22 days ago by Michael Roza
CSA CxO Trust
0 22 days ago by Orbert
IEC 81001-5-1:2021 Health software and health IT systems safety, effectiveness and security - Part 5-1: Security - Activities in the product life cycle
0 22 days ago by Michael Roza
ISO/IEC TS 38505-3:2021 Information technology - Governance of data - Part 3: Guidelines for data classification
0 22 days ago by Michael Roza
FedRAMP released baselines for public comment
0 24 days ago by Michael Roza
IEC City Information Modelling and Urban Digital Twins
0 24 days ago by Michael Roza
ISO/IEC 27070:2021 Information technology - Security techniques - Requirements for establishing virtualized roots of trust
0 24 days ago by Michael Roza