The Inner Circle

 View Only

1 to 50 of 1944 threads (3.5K total posts)
  Thread Subject Replies Last Post Status
Introduction
1 4 days ago by Marina Bregkou
Original post by Salman Younus
NIST IR 8425A Recommended Security Requirements for Consumer-Grade Router Products for Comment
0 5 days ago by Michael Roza
Joint Cybersecurity Information Deploying AI Systems Securely
0 7 days ago by Michael Roza
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 11 days ago by Michael Roza
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
3 12 days ago by Troy Leach
Original post by Michael Roza
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 13 days ago by Michael Roza
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 17 days ago by Michael Roza
6G Next G Alliance Report: Management and Orchestration
0 17 days ago by Michael Roza
Identity Management Day
0 18 days ago by Ryan Gifford
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 19 days ago by Michael Roza
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
0 19 days ago by Michael Roza
Questions after completion of the CSA STAR Auditor course
1 22 days ago by JOHN DIMARIA
Original post by Paul Chavez
Role of Agile Coaches in Cyber Security
0 22 days ago by Meghana Parwate
Is there a good questionnaire for a services vendor?
2 25 days ago by Tom Spitzer
ENISA Foresight Cybersecurity Threats For 2030 - Update 2024: Executive Summary
0 25 days ago by Michael Roza
Hello and Ask for News Sources
0 26 days ago by Craig Woods
Hello from DFW
0 27 days ago by Nicholas Grant
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
0 one month ago by Michael Roza
Greetings From Chicago!
0 one month ago by Nahil Mahmood
FedRAMP Penetration Test Guidance
0 one month ago by Michael Roza
ENISA Telecom Security Incidents 2022
0 one month ago by Michael Roza
NSA Manage Cloud Logs for Effective Threat Hunting
0 one month ago by Michael Roza
CCSK v.5 Chapter 5 Peer Review is Now Open
0 one month ago by Olivia Rempe
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
0 one month ago by Michael Roza
ENISA Remote ID Proofing - Good practices
0 one month ago by Michael Roza
Enjoy Your CSA Pi
0 one month ago by Olivia Rempe
CCSKv5 Peer Review: Domain 5
0 one month ago by Judith Bagwell
NSA Uphold the Cloud Shared Responsibility Model
0 one month ago by Michael Roza
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
0 one month ago by Michael Roza
NSA CISA Use Secure Cloud Key Management Practices
0 one month ago by Michael Roza
NSA CISA Secure Data in the Cloud
0 one month ago by Michael Roza
Domain Taxonomies for Cloud Data Governance
0 one month ago by Claude Baudoin
NSA CISA Use Secure Cloud Identity and Access Management Practices
0 one month ago by Michael Roza
NSA CISA Implement Network Segmentation and Encryption in Cloud Environments
0 one month ago by Michael Roza
CSA AI Summit at RSA Conference & CSA Meetup at RSA
1 one month ago by Brittany Emeonye
Original post by Erik Johnson
NSA Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
0 one month ago by Michael Roza
THe White House ONCD Report Back to the Building Blocks: A Path Toward Secure and Measurable Software
0 one month ago by Michael Roza
ENISA Best Practices for Cyber Crisis Management
1 one month ago by BENJAMIN BROSSARD
Original post by Michael Roza
NIST CSF 2.0, the new Small Business Quick Start Guide & Webinar
2 one month ago by Michael Roza
DHS and CISA Info Graphic Cyber Threats to Medical Technology and Communication Technology Protocols
0 one month ago by Michael Roza
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
0 one month ago by JOHN DIMARIA
Executive Order 14116 on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States
0 one month ago by Michael Roza
NIST SP.1800-28 and 29 - Data Confidentiality: Identifying and Protecting Assets Against Data Breaches and Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
0 one month ago by Michael Roza
CCSKv5 Peer Review: Domain 4
0 one month ago by Anna Schorr
OPEN VPN
0 2 months ago by Mesut Selen
ZT and SSL Encryption
10 2 months ago by Marco Ermini
Original post by Ross Kovelman
CISA EPA FBI Top Cyber Actions for Securing Water Systems - Critical Infrastructure
0 2 months ago by Michael Roza
2024 SonicWall Cyber Threat Report is here
0 2 months ago by MOHAMED EL TELAWI
New to the cyber security world
0 2 months ago by Diane Gross
Get ready: CCSK v5 is coming early July!
0 2 months ago by Anna Schorr