The Inner Circle

 View Only

1 to 50 of 1942 threads (3.5K total posts)
  Thread Subject Replies Last Post Status
Joint Cybersecurity Information Deploying AI Systems Securely
0 10 hours ago by Michael Roza
NIST IR 8475 A Security Perspective on the Web3 Paradigm Available for Comment
0 3 days ago by Michael Roza
ENISA Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
3 5 days ago by Troy Leach
Original post by Michael Roza
NSA Advancing Zero Trust Maturity Throughout the Data Pillar
0 6 days ago by Michael Roza
DHS Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements for comment
0 10 days ago by Michael Roza
6G Next G Alliance Report: Management and Orchestration
0 10 days ago by Michael Roza
Identity Management Day
0 11 days ago by Ryan Gifford
CISA Continuous Diagnostics and Mitigation (CDM) Program Architecture CDM Data Model Document Version 4.1.1
0 11 days ago by Michael Roza
CSWP 33, Product Development Cybersecurity Handbook: Concepts and Considerations for IoT Product Manufacturers for comment
0 12 days ago by Michael Roza
Questions after completion of the CSA STAR Auditor course
1 14 days ago by JOHN DIMARIA
Original post by Paul Chavez
Role of Agile Coaches in Cyber Security
0 14 days ago by Meghana Parwate
Is there a good questionnaire for a services vendor?
2 17 days ago by Tom Spitzer
ENISA Foresight Cybersecurity Threats For 2030 - Update 2024: Executive Summary
0 18 days ago by Michael Roza
Hello and Ask for News Sources
0 18 days ago by Craig Woods
Hello from DFW
0 20 days ago by Nicholas Grant
CISA FBI MS-ISAC UNDERSTANDING AND RESPONDING TO DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
0 25 days ago by Michael Roza
Greetings From Chicago!
0 28 days ago by Nahil Mahmood
FedRAMP Penetration Test Guidance
0 one month ago by Michael Roza
ENISA Telecom Security Incidents 2022
0 one month ago by Michael Roza
NSA Manage Cloud Logs for Effective Threat Hunting
0 one month ago by Michael Roza
CCSK v.5 Chapter 5 Peer Review is Now Open
0 one month ago by Olivia Rempe
NSA Enforce Secure Automated Deployment Practices through Infrastructure as Code
0 one month ago by Michael Roza
ENISA Remote ID Proofing - Good practices
0 one month ago by Michael Roza
Enjoy Your CSA Pi
0 one month ago by Olivia Rempe
CCSKv5 Peer Review: Domain 5
0 one month ago by Judith Bagwell
NSA Uphold the Cloud Shared Responsibility Model
0 one month ago by Michael Roza
CISA Secure Cloud Business Applications: Hybrid Identity Solutions Guidance
0 one month ago by Michael Roza
NSA CISA Use Secure Cloud Key Management Practices
0 one month ago by Michael Roza
NSA CISA Secure Data in the Cloud
0 one month ago by Michael Roza
Domain Taxonomies for Cloud Data Governance
0 one month ago by Claude Baudoin
NSA CISA Use Secure Cloud Identity and Access Management Practices
0 one month ago by Michael Roza
NSA CISA Implement Network Segmentation and Encryption in Cloud Environments
0 one month ago by Michael Roza
CSA AI Summit at RSA Conference & CSA Meetup at RSA
1 one month ago by Brittany Emeonye
Original post by Erik Johnson
NSA Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
0 one month ago by Michael Roza
THe White House ONCD Report Back to the Building Blocks: A Path Toward Secure and Measurable Software
0 one month ago by Michael Roza
ENISA Best Practices for Cyber Crisis Management
1 one month ago by BENJAMIN BROSSARD
Original post by Michael Roza
NIST CSF 2.0, the new Small Business Quick Start Guide & Webinar
2 one month ago by Michael Roza
DHS and CISA Info Graphic Cyber Threats to Medical Technology and Communication Technology Protocols
0 one month ago by Michael Roza
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
0 one month ago by JOHN DIMARIA
Executive Order 14116 on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States
0 one month ago by Michael Roza
NIST SP.1800-28 and 29 - Data Confidentiality: Identifying and Protecting Assets Against Data Breaches and Data Confidentiality: Detect, Respond to, and Recover from Data Breaches
0 one month ago by Michael Roza
CCSKv5 Peer Review: Domain 4
0 one month ago by Anna Schorr
OPEN VPN
0 one month ago by Mesut Selen
ZT and SSL Encryption
10 one month ago by Marco Ermini
Original post by Ross Kovelman
CISA EPA FBI Top Cyber Actions for Securing Water Systems - Critical Infrastructure
0 one month ago by Michael Roza
2024 SonicWall Cyber Threat Report is here
0 one month ago by MOHAMED EL TELAWI
New to the cyber security world
0 one month ago by Diane Gross
Get ready: CCSK v5 is coming early July!
0 one month ago by Anna Schorr
CISA / MS-ISAC Joint Advisory - Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization
0 one month ago by Michael Roza
New Google initiative launching: The AI Cyber Defense Initiative
0 one month ago by Erik Johnson