The Inner Circle

 View Only

1 to 50 of 1926 threads (3.5K total posts)
  Thread Subject Replies Last Post Status
Greetings From Chicago!
0 15 hours ago by Nahil Mahmood
FedRAMP Penetration Test Guidance
0 2 days ago by Michael Roza
ENISA Telecom Security Incidents 2022
0 2 days ago by Michael Roza
NSA Manage Cloud Logs for Effective Threat Hunting
0 3 days ago by Michael Roza
CCSK v.5 Chapter 5 Peer Review is Now Open
0 4 days ago by Olivia Rempe
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
0 4 days ago by Michael Roza
ENISA Remote ID Proofing - Good practices
0 4 days ago by Michael Roza
Enjoy Your CSA Pi
0 4 days ago by Olivia Rempe
CCSKv5 Peer Review: Domain 5
0 5 days ago by Judith Bagwell
NSA Uphold the Cloud Shared Responsibility Model
0 5 days ago by Michael Roza
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
0 6 days ago by Michael Roza
NSA CISA Use Secure Cloud Key Management Practices
0 10 days ago by Michael Roza
NSA CISA Secure Data in the Cloud
0 10 days ago by Michael Roza
Domain Taxonomies for Cloud Data Governance
0 11 days ago by Claude Baudoin
NSA CISA Use Secure Cloud Identity and Access Management Practices
0 11 days ago by Michael Roza
NSA CISA Implement Network Segmentation and Encryption in Cloud Environments
0 11 days ago by Michael Roza
CSA AI Summit at RSA Conference & CSA Meetup at RSA
1 11 days ago by Brittany Emeonye
Original post by Erik Johnson
NSA Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
0 12 days ago by Michael Roza
THe White House ONCD Report Back to the Building Blocks: A Path Toward Secure and Measurable Software
0 15 days ago by Michael Roza
ENISA Best Practices for Cyber Crisis Management
1 17 days ago by BENJAMIN BROSSARD
Original post by Michael Roza
NIST CSF 2.0, the new Small Business Quick Start Guide & Webinar
2 18 days ago by Michael Roza
DHS and CISA Info Graphic Cyber Threats to Medical Technology and Communication Technology Protocols
0 19 days ago by Michael Roza
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
0 21 days ago by JOHN DIMARIA
Executive Order 14116 on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States
0 23 days ago by Michael Roza
NIST SP.1800-28 and 29 - Data Confidentiality: Identifying and Protecting Assets Against Data Breaches and Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
0 23 days ago by Michael Roza
CCSKv5 Peer Review: Domain 4
0 24 days ago by Anna Schorr
OPEN VPN
0 24 days ago by Mesut Selen
ZT and SSL Encryption
10 24 days ago by Marco Ermini
Original post by Ross Kovelman
CISA EPA FBI Top Cyber Actions for Securing Water Systems - Critical Infrastructure
0 26 days ago by Michael Roza
2024 SonicWall Cyber Threat Report is here
0 26 days ago by MOHAMED EL TELAWI
New to the cyber security world
0 26 days ago by Diane Gross
Get ready: CCSK v5 is coming early July!
0 one month ago by Anna Schorr
CISA / MS-ISAC Joint Advisory - Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization
0 one month ago by Michael Roza
New Google initiative launching: The AI Cyber Defense Initiative
0 one month ago by Erik Johnson
Building cyber resilience with business continuity planning
0 one month ago by Jordan Watkins
NIST SP 800-66r2 Rev 2, Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide
0 one month ago by Michael Roza
State of SaaS Security Survey 2024
0 one month ago by Olivia Rempe
NIST SP 800-204D - Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines
0 one month ago by Michael Roza
NIST SP 800-223, High-Performance Computing Security: Architecture, Threat Analysis, and Security Posture.
0 one month ago by Michael Roza
Data Centric versus Network Centric
1 one month ago by Alex Sharpe
Original post by Claudia Johnson
Cyber Resilience With Business Continuity Planning
0 one month ago by Jordan Watkins
Survey and Report on Financial Services Readiness to Address Cyber Resiliency and Regulatory Changes: Review by 2/15/24
0 one month ago by Alex Kaluza
🚨 Calling all AI enthusiasts!!
0 one month ago by Shalonda Willis
Security Patching
0 one month ago by Ashwani Paliwal
Hi and thank you for welcoming me to the community
0 one month ago by Joseph OHara
Recommended Paths for Cloud Roles
0 one month ago by Anonymous Member
NIST Internal Report (IR) 8504, Access Control on NoSQL Databases, for comment
0 one month ago by Michael Roza
FedRamp Emerging Technology Prioritization Framework for Comment
0 one month ago by Michael Roza
CISA and The DOJ - Secure by Design Alert Security Design Improvements for SOHO Device Manufacturers
0 one month ago by Michael Roza
New Member Introduction
1 one month ago by Nic Bishop
Original post by Melissa Potts