Top Threats

1 to 50 of 228 threads (288 total posts)
  Thread Subject Replies Last Post Status
NSA DoD Microelectronics: Field Programmable Gate Array Overall Assurance Process
0 9 hours ago by Michael Roza
NSA DoD Microelectronics: Third-party IP Review Process for Level of Assurance 1
0 9 hours ago by Michael Roza
ENISA Foreign Information Manipulation Interference (FIMI) and Cybersecurity - Threat Landscape
0 10 hours ago by Michael Roza
NIST Special Publication (SP) 800-160 Volume 1, Engineering Trustworthy Secure Systems
2 2 days ago by Michael Roza
ENISA's NIS Investments report
0 14 days ago by Michael Roza
NIST Special Publication (SP) 800-188, De-Identifying Government Data Sets, for public comment.
0 22 days ago by Michael Roza
ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection - Guidance on managing information security risks
0 23 days ago by Michael Roza
ISO/IEC 27556:2022 Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
0 24 days ago by Michael Roza
NSA Software Memory Safety
0 26 days ago by Michael Roza
ENISA Threat Landscape 2022
0 one month ago by Michael Roza
CISA - Implementing Phishing-Resistant MFA and Implementing Number Matching in MFA Applications.
0 one month ago by Michael Roza
OECD SECURITY OF THE DOMAIN NAME SYSTEM (DNS)
0 one month ago by Michael Roza
CISA Strategic Plan 2023-2025
0 one month ago by Michael Roza
NIST Special Publication (SP) 800-220, 2021 Cybersecurity and Privacy Program Annual Report
0 one month ago by Michael Roza
Seeking new co-chair for the Cloud Key Mgmt working group!!!!
0 one month ago by Marina Bregkou
CISA DOJ NSA Joint Cybersecurity Advisory - Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization
0 2 months ago by Michael Roza
Department of Justice - Landmark U.S.-UK Data Access Agreement Enters into Force
0 2 months ago by Michael Roza
NSA CISA CSA Control System Defense Know the Opponent
0 2 months ago by Michael Roza
A question for the Pandemic Eleven.
3 3 months ago by Michael Roza
Original post by Masahiro Morozumi
Pandemic Eleven Typos
0 4 months ago by Ben Robinson
NIST SP 800-215 Guide to a Secure Enterprise Network Landscape
0 4 months ago by Michael Roza
ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS
0 4 months ago by Michael Roza
Trust Services Security Incidents 2021
0 4 months ago by Michael Roza
ISO/IEC 27036-2:2022 Cybersecurity - Supplier relationships - Part 2: Requirements
0 4 months ago by Michael Roza
NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Call for Comments
0 4 months ago by Michael Roza
NSA CTR DoD Microelectronics: Levels of Assurance Definitions and Applications
0 4 months ago by Michael Roza
Recommendations for using a Customer Controlled Key Store Open for Peer Review
0 4 months ago by Michael Roza
ENISA Cybersecurity Threat Landscape Methodology
0 5 months ago by Michael Roza
The ENISA CONSOLIDATED ANNUAL ACTIVITY REPORT 2021
0 5 months ago by Michael Roza
FedRAMP Penetration Test Guidance Version 3
0 5 months ago by Michael Roza
NIST SP 800-219 Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
0 5 months ago by Michael Roza
NSA: CSI Keeping PowerShell: Security Measures to Use and Embrace
0 5 months ago by Michael Roza
CISA Trusted Internet Connections 3.0 Cloud Use Case June 2022 Version 1.0
0 5 months ago by Michael Roza
NSA CTR Network Report Infrastructure Security Guide
0 5 months ago by Michael Roza
NIST releases Cybersecurity White Paper 26 Ordered tway Combinations for Testing State-based Systems
0 5 months ago by Michael Roza
NIST IR 8286D Using Business Impact Analysis to Inform Risk Prioritization and Response draft for comment
0 6 months ago by Michael Roza
NIST IR 8409 Measuring the Common Vulnerability Scoring System Base Score Equation Draft for Comment
0 6 months ago by Michael Roza
NIST SP 800-160 Volume 1 Engineering Trustworthy Secure Systems: Final Public Draft is Available for Comment
0 6 months ago by Michael Roza
NSA State-Sponsored Cyber Actors Exploit Network Providers and Devices
0 6 months ago by Michael Roza
Top Threats to Cloud Computing: Egregious Eleven
0 6 months ago by Ibrahim Bin Asaker
Peer Review ending soon (May 21st): Top Threats to Cloud Computing Pandemic Eleven
0 6 months ago by Shamun Mahmud
ENISA Research and Innovation Brief - Annual Report on Cybersecurity Research and Innovation Needs and Priorities
0 6 months ago by Michael Roza
Joint Cybersecurity Advisory Protecting Against Cyber Threats to Managed Service Providers and their Customers
0 7 months ago by Michael Roza
NSA CSA Protecting VSAT Communications
0 7 months ago by Michael Roza
NIST SP 800-161 Revision 1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organization
0 7 months ago by Michael Roza
Joint Cybersecurity Advisory 2021 Top Routinely Exploited Vulnerabilities
0 7 months ago by Michael Roza
Joint Cybersecurity Advisory Russian State Sponsored and Criminal Cyber Threats to Critical Infrastructure
0 7 months ago by Michael Roza
NISTIR 8320C Draft Hardware Enabled Security: 2 Machine Identity Management and Protection
0 7 months ago by Michael Roza
NIST.IR.8320B Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms
0 7 months ago by Michael Roza
NIST/NCCOE Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments
0 7 months ago by Michael Roza