The Inner Circle

 View Only

1 to 50 of 1356 threads (2.4K total posts)
  Thread Subject Replies Last Post Status
CSA’s Trusted Cloud Consultant Program
0 12 hours ago by Orbert Reavis
CSA Federal Summit 2022
0 yesterday by Orbert Reavis
FDA Guidance Clinical Decision Support Software
0 yesterday by Michael Roza
CxO Trust Summit today!
4 2 days ago by Jim Reavis
#TechTopicTuesday
0 2 days ago by Orbert Reavis
Security Advisory for C-Suite, Top IT Executives, CISOs, CTO, SOCs and Security Professionals (Quick Read) by David Olugbenga
0 3 days ago by David Olugbenga
FDA The Software Precertification (Pre-Cert) Pilot Program: Tailored Total Product Lifecycle Approaches and Key Findings.
0 3 days ago by Michael Roza
Peer Review: 2022 Cybersecurity Forecast for Turkey
0 3 days ago by Orbert Reavis
ISO/IEC 29192-8:2022 Information security - Lightweight cryptography - Part 8: Authenticated encryption
0 5 days ago by Michael Roza
BlackCat ransomware's data exfiltration tool gets an upgrade
0 6 days ago by Vipul Patel
CSA Blogs
0 6 days ago by Orbert Reavis
NSA CISA CSA Control System Defense Know the Opponent
0 7 days ago by Michael Roza
IAM WG Meeting 9/15
0 7 days ago by Ryan Gifford
SECtember 2022
0 7 days ago by Orbert Reavis
Zero Trust Resource Hub
0 8 days ago by Orbert Reavis
Workshop Summary Report for "Building on the NIST Foundations: Next Steps in IoT Cybersecurity" (NIST IR 8431)
0 9 days ago by Michael Roza
NIST Profile of the IoT Core Baseline for Consumer IoT Products (NIST IR 8425)
0 9 days ago by Michael Roza
NIST Proposes the Conversion of FIPS 198-1 (HMAC) to a NIST Special Publication
0 9 days ago by Michael Roza
#TechTopicTuesday
0 9 days ago by Orbert Reavis
Strategies for Financial Services organizations to manage risk in the Cloud
7 10 days ago by Claude Baudoin
Original post by Orbert Reavis
Level Up: Booster
1 10 days ago by Zbyszek K-M
Original post by Orbert Reavis
Uber hacker reveals himself in company Slack channel after breach
0 9 days ago by Michael Tayo
Jordan Bodily Member Spotlight & The Future of Cloud Security
0 10 days ago by Orbert Reavis
Microsoft Teams deemed unsafe to use by security researchers
0 11 days ago by Vipul Patel
Cyber Summit 2022
0 13 days ago by Samantha Fuentes WIlliams
CCSK Success Stories
0 13 days ago by Orbert Reavis
SECtember 2022
0 14 days ago by Orbert Reavis
NIST Internal Report (IR) 8286C, Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight.
0 15 days ago by Michael Roza
CSA Briefing in Intersec Saudi Arabia 2022 conference
0 15 days ago by Ibrahim Bin Asaker
Level Up
0 15 days ago by Olivia Rempe
Researchers discover a new attack that can steal a Tesla Model Y ... in seconds.
0 15 days ago by Michael Tayo
Fed Summit 2022
0 15 days ago by Orbert Reavis
For Fun – Aligning or Putting Music to the Varieties of Efforts, Tasks, Work Roles, and Functions in Cybersecurity
0 15 days ago by Adrienne Blue
IAM Working Group Meeting
0 16 days ago by Ryan Gifford
#TechTopicTuesday
0 16 days ago by Orbert Reavis
"Threat Landscape Unknown" A Review of Cyberthreat Landscape Methodology 2022 -ENISA CTL
0 16 days ago by David Olugbenga
FDA Computer Software Assurance for Production and Quality System Software just released for comment
0 17 days ago by Michael Roza
How to Benchmark Your Cloud Security Maturity and Act on What You Discover
0 17 days ago by Orbert Reavis
NSA Announces the Commercial National Security Algorithm Suite 2.0 and Accompanying FAQ
0 21 days ago by Michael Roza
The State of Cloud Data Security
0 21 days ago by Orbert Reavis
ISO/IEC 18045:2022 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Methodology for IT security evaluation
0 22 days ago by Michael Roza
ISO/IEC 15408-5:2022 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 5: Pre-defined packages of security requirements
0 22 days ago by Michael Roza
ISO/IEC 15408-4:2022 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 4: Framework for the specification of evaluation methods and activities
0 22 days ago by Michael Roza
NIST Special Publication (SP) 800-90C, Draft Recommendation for Random Bit Generator (RBG) Constructions
0 22 days ago by Michael Roza
NIST IR 8427, Draft For Comment Discussion on the Full Entropy Assumption of the SP 800-90 Series
0 22 days ago by Michael Roza
Deliver CSA training in your own environment
0 22 days ago by Orbert Reavis
NSA, ODNI, and CISA Securing the Software Supply Chain: Recommended Practices for Developers
6 22 days ago by Michael Roza
New Member Post
3 23 days ago by Bonaventure Osita Onyishi
Original post by Hannah Langan
Microsoft discover one-click TikTok account takeover vulnerability
0 23 days ago by Michael Tayo
#TechTopicTuesday
0 23 days ago by Orbert Reavis