Top Threats

1 to 50 of 156 threads (214 total posts)
  Thread Subject Replies Last Post Status
NSA CTR Recommendations for Configuring Adobe Acrobat Reader DC in a Windows Environment
0 5 days ago by Michael Roza
ENISA Digital Identity: Leveraging the SSI Concept to Build Trust
0 5 days ago by Michael Roza
ENISA Remote Identity Proofing - Attacks & Countermeasures
0 5 days ago by Michael Roza
ENISA Compendium of Risk Management Frameworks with Potential Interoperability
0 12 days ago by Michael Roza
JCA Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
0 14 days ago by Michael Roza
NIST SP 800-160 Volume 1, Engineering Trustworthy Secure Systems for Comment
0 14 days ago by Michael Roza
CISA Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
0 one month ago by Michael Roza
NIST Publishes SP 800-160 Vol. 2, Revision 1 Developing Cyber-Resilient Systems: A Systems Security Engineering Approach
0 one month ago by Michael Roza
ENISA Countering SIM-Swapping
0 one month ago by Michael Roza
NIST Special Publication 800-161 Rev. 1, Cybersecurity Supply Chain Risk Management Practices Draft 2 for Comment
0 one month ago by Michael Roza
FDA Announces Release of "Playbook for Threat Modeling Medical Devices"
0 one month ago by Michael Roza
NIST IoT Cybersecurity Guidance - SP 800-213 & SP 800-213A
0 one month ago by Michael Roza
ENISA - Raising Awareness of Cybersecurity - key element of NCSS
0 one month ago by Michael Roza
Insider Risk Mitigation Program Evaluation (IRMPE) Tool
0 2 months ago by Michael Roza
ENISA Railway Cybersecurity - Good Practices in Cyber Risk Management
0 2 months ago by Michael Roza
ENISA Foresight Challenges
0 2 months ago by Michael Roza
NIST Patch Management - Special Publication 1800-31 and SP 800-40 Revision 4 Comments Wanted
0 2 months ago by Michael Roza
NIST Patch Management -
0 2 months ago by Michael Roza
ENISA Report - NIS Investments 2021
0 2 months ago by Michael Roza
CISA New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks
0 2 months ago by Michael Roza
The Homeland Security Systems Engineering and Development Institute, sponsored by the Department of Homeland Security and operated by MITRE, has released the 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list.
0 2 months ago by Michael Roza
ENISA Threat Landscape 2021
0 2 months ago by Michael Roza
NIST Comments Wanted on Draft Reports on Hardware-Enabled Security and Trusted Cloud
0 3 months ago by Michael Roza
Joint Cybersecurity CISA, FBI, and NSA provides guidance concerning BlackMatter Ransomware.
0 3 months ago by Michael Roza
NSA CSA Ongoing Cyber Threats to U.S. Water and Wastewater Systems
0 3 months ago by Michael Roza
NSA Avoid Dangers of Wildcard TLS Certificates and the ALPACA Technique
0 3 months ago by Michael Roza
NIST (SP) 800-214 2020 Cybersecurity and Privacy Program Annual Report,
0 3 months ago by Michael Roza
NSA Selecting and Hardening Remote Access VPN Solutions
0 3 months ago by Michael Roza
Cloud Events/Breaches
0 4 months ago by Jon-Michael C. Brook
ISO/IEC 19944-1:2020 Cloud computing and distributed platforms ─ Data flow, data categories and data use - Part 1: Fundamentals
0 4 months ago by Elrasheid Mohmed Adam
ISO/IEC 27036-1:2021 Cybersecurity - Supplier relationships - Part 1: Overview and concepts
0 4 months ago by Michael Roza
ENISA - Methodology for a Sectoral Cybersecurity Assessment
0 4 months ago by Michael Roza
NISTIR 8374 Draft The Cybersecurity Framework Profile for Ransomware Risk Management,
0 4 months ago by Michael Roza
NSA Keeping Safe on Social Media Update
0 5 months ago by Michael Roza
ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS
0 6 months ago by Michael Roza
ENISA Trust Services Security Incidents 2020 - Annual Report
0 6 months ago by Michael Roza
ENISA Telecom Security Incidents 2020 - Annual Report
0 6 months ago by Michael Roza
NIST SP 800-47 Rev. 1 Managing the Security of Information Exchanges
0 6 months ago by Michael Roza
NSA State Sponsored Top Threats
0 6 months ago by Michael Roza
NIST Delivers on Two Key Publications to Enhance Software Supply Chain Security Called for by Executive Order
0 6 months ago by Michael Roza
NSA Cybersecurity Technical Report Deploying Secure Communications Voice and Video Over IP Systems
0 7 months ago by Michael Roza
NIST Cybersecurity White Paper, Combinatorial Coverage Difference Measurement, is now available for public comment.
0 7 months ago by Michael Roza
CISA Rising Ransomware Threat to Operational Technology Assets
0 7 months ago by Michael Roza
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement
0 8 months ago by Michael Roza
CISA AR21-134A Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise
0 8 months ago by Michael Roza
NSA Cybersecurity Advisory: Further TTPs associated with SVR cyber actors
0 8 months ago by Michael Roza
BakerHostetler (Law Firm) 2021 Data Security Incident Response Report – Disruption and Transformation A MUST READ
0 8 months ago by Michael Roza
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement
0 9 months ago by Michael Roza
FedRAMP Incident Communications Procedures V4.0
0 9 months ago by Michael Roza
Top 10 Threat Must be Solve Before 2025
0 9 months ago by Elrasheid Mohmed Ahmed Elrayah Elrayah