Top Threats

1 to 50 of 316 threads (383 total posts)
  Thread Subject Replies Last Post Status
FedRAMP Penetration Test Guidance
0 2 days ago by Michael Roza
ENISA Telecom Security Incidents 2022
0 2 days ago by Michael Roza
NSA Manage Cloud Logs for Effective Threat Hunting
0 4 days ago by Michael Roza
Top Threats Meeting Minutes 2024-03-14
0 4 days ago by Vic Hargrave
ENISA Remote ID Proofing - Good practices
0 5 days ago by Michael Roza
THe White House ONCD Report Back to the Building Blocks: A Path Toward Secure and Measurable Software
0 15 days ago by Michael Roza
Top Threats Meeting Minutes 2024-02-29
0 18 days ago by Vic Hargrave
ENISA Best Practices for Cyber Crisis Management
0 19 days ago by Michael Roza
Executive Order 14116 on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States
0 24 days ago by Michael Roza
NIST SP.1800-28 and 29 - Data Confidentiality: Identifying and Protecting Assets Against Data Breaches and Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
0 24 days ago by Michael Roza
CISA EPA FBI Top Cyber Actions for Securing Water Systems - Critical Infrastructure
0 26 days ago by Michael Roza
CISA / MS-ISAC Joint Advisory - Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization
0 one month ago by Michael Roza
Top Threats Meeting Minutes 2024-02-15
0 one month ago by Vic Hargrave
Top Threats Meeting Minutes 2024-02-01
0 one month ago by Vic Hargrave
NIST Internal Report (IR) 8504, Access Control on NoSQL Databases, for comment
0 one month ago by Michael Roza
CISA and The DOJ - Secure by Design Alert Security Design Improvements for SOHO Device Manufacturers
0 one month ago by Michael Roza
Top Threats Meeting Minutes 2024-01-18
0 2 months ago by Vic Hargrave
CISA Personal Security Considerations Action Guide: Critical Infrastructure Workers
0 2 months ago by Michael Roza
NIST AI 100-2e2023, Adversarial Machine Learning
0 2 months ago by Vic Hargrave
NSA CSI Recommendations for Software Bill of Materials (SBOM) Management (Jan 2024 Update)
0 2 months ago by Michael Roza
NSA 2023 Cybersecurity Year In Review
0 2 months ago by Michael Roza
NIST IR 8432, Cybersecurity of Genomic Data
0 2 months ago by Michael Roza
NSA Recommendations for Software Bill of Materials (SBOM) Management
0 3 months ago by Michael Roza
NSA Managing Risk from Software Defined Networking Controllers
0 3 months ago by Michael Roza
NSA CISA Securing the Software Supply Chain: Recommended Practices for Managing Open-Source Software and Software Bill of Materials
0 3 months ago by Michael Roza
ENISA Threat Landscape for DoS Attacks
0 3 months ago by Michael Roza
NSA CTR: DoD Microelectronics: NSA Evaluation of Commercially Available Embedded FPGAs
0 3 months ago by Michael Roza
Joint Advisory The Case for Memory Safe Roadmaps
0 3 months ago by Michael Roza
Modernizing the Federal Risk Authorization Management Program (FedRAMP)
0 3 months ago by Michael Roza
CISA just published Secure by Design - How Software Manufacturers Can Shield Web Management Interfaces From Malicious Cyber Activity
0 3 months ago by Michael Roza
NIST Phish Scale User Guide
0 3 months ago by Michael Roza
NIST Two New Final Publications – Integrating ICT Risk Management in the Enterprise
0 4 months ago by Michael Roza
NSA Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption
0 4 months ago by Michael Roza
ENISA Threat Landscape 2023
0 4 months ago by Michael Roza
Joint CIS/NSA/FBI Stop Ransomware Guide
0 4 months ago by Michael Roza
NSA Phishing Guidance: Stopping the Attack Cycle at Phase One
0 5 months ago by Michael Roza
NIST Log Management Planning Guide: Draft SP 800-92r1 Available for Comment
0 5 months ago by Michael Roza
NSA and CISA publishes Identity and Access Management: Developer and Vendor Challenges
0 5 months ago by Michael Roza
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
0 5 months ago by Michael Roza
NSA Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
0 5 months ago by Michael Roza
OWASP Top 10 Vulnerabilities for LLMs
0 7 months ago by Thanos Vrachnos
NSA and CISA publishes Harden Baseboard Management Controllers
0 9 months ago by Michael Roza
CISA Binding Operational Directive (BOD) 23-02, Mitigating the Risk from Internet-Exposed Management Interfaces
0 9 months ago by Michael Roza
Data Breach at Managed Care of North America (MCNA)
0 9 months ago by Shamun Mahmud
NSA Software Memory Safety
0 10 months ago by Michael Roza
NSC APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers
0 11 months ago by Michael Roza
NIST CSWP 28 Security Segmentation in a Small Manufacturing Environment
0 11 months ago by Michael Roza
3CXDesktop and Supply Chain Incident
0 11 months ago by Derek Buchanan
NSA Advancing Zero Trust Maturity Throughout the User Pillar - Updated April
0 11 months ago by Michael Roza
Macstealer malware update
0 11 months ago by Shamun Mahmud