The Inner Circle

1 to 50 of 667 threads (1.4K total posts)
  Thread Subject Replies Last Post Status
Jurisdictions allowing company incorporation online
0 3 hours ago by Confidus
NISTIR 8360 Machine Learning for Access Control Policy Verification
0 6 hours ago by Michael
Philippe Courtot Leadership Award
0 21 hours ago by Orbert
EU AI Standardisation Landscape state of play and link to the EC proposal for an AI regulatory framework
0 yesterday by Michael
#TechTopicTuesday 1 yesterday by Claude
Original post by Orbert
Hi - Looking forward to contribute
0 2 days ago by Jorge
Redefining Data Protection Series - Part 1 of 4
0 2 days ago by Jodi
NIST Withdraws three Crypto publications - SP 800-15, SP 800-25 and SP 800-32 related to PKI
0 3 days ago by Michael
ENISA - Methodology for a Sectoral Cybersecurity Assessment
0 3 days ago by Michael
SECtember: Why I'm Going 0 3 days ago by Olivia
Threat Modelling with remote participants
8 3 days ago by Shyam
Original post by Rowan
A User-First Approach to MFA 0 3 days ago by Orbert
You're invited to 4th Annual National Cybersecurity Summit
0 4 days ago by Al
Wide-ranging SEC probe into SolarWinds related incidents sparks fear in Corporate America
0 6 days ago by Mark
CSA Federal Summit 0 6 days ago by Orbert
NISTIR 8374 Draft The Cybersecurity Framework Profile for Ransomware Risk Management,
3 6 days ago by Michael
Foresight is 20/20: How to Use Cyber Threat Intelligence for Proactive SecOps 0 7 days ago by Olivia
Is the U.S. repeating 9/11 mistakes in the digital era?
0 8 days ago by Jim
The CSA Seattle Chapter is Relaunching 0 8 days ago by Olivia
#TechTopicTuesday 1 9 days ago by Simon
Original post by Orbert
ISO/IEC TS 20000-11:2021 Information technology - Service management - Part 11: Guidance on the relationship between ISO/IEC 20000-1 and service management frameworks: ITIL®
0 10 days ago by Michael
Secure DevOps and Misconfigurations Survey
3 13 days ago by Max
Original post by Orbert
How is CSA STAR Different From ISO 27001 and SOC 2? 1 13 days ago by Simon
Original post by Orbert
FedRAMP SSP ATTACHMENT 13 - Integrated Inventory Workbook Template
5 13 days ago by Robert
Original post by Michael
NIST Seeking Comments Draft Criteria for Labeling Program on Capabilities of IoT Devices
1 14 days ago by Anna
Original post by Michael
Collaborate with NIST On Our Latest Applied Cryptography Project
1 14 days ago by Anna
Original post by Michael
Prioritizing Cybersecurity Risk for Enterprise Risk Management: Draft NISTIR 8286B Available for Comment
1 14 days ago by Anna
Original post by Michael
CSA CxO Trust
0 14 days ago by Orbert
#TechTopicTuesday 1 15 days ago by Simon
Original post by Orbert
NIST Validating the Integrity of Computing Devices: Preliminary Draft of SP 1800-34B Available for Comment
0 16 days ago by Michael
So A Cloud Security Expert Walks Into a CISO Role... 0 17 days ago by Orbert
ISO/IEC 30147:2021 Information technology - Internet of things - Methodology for trustworthiness of IoT system/service
1 17 days ago by Seshagopalan
Original post by Michael
How do you risk assess infrastructure blueprints?
9 18 days ago by Robert
Original post by Rima
NIST Technical Series Publications: Proposed Publication Identifier Syntax
0 20 days ago by Michael
SECtember 2021: Why I'll Be There
0 20 days ago by Orbert
20% off CCSK training and exam 0 21 days ago by Orbert
A unified and proven Zero Trust system with BeyondCorp and BeyondProd
0 22 days ago by Mark
New: AWS IAM Access Analyzer expands to 50+ services - helps you achieve least privilege by generating fine-grained policies that specify the required actions
0 22 days ago by Mark
Microsoft commits to spend $20 billion on cybersecurity over five years
0 22 days ago by Mark
T-Mobile Data Breach and Response
2 22 days ago by Claude
Original post by Olivia
NISTIR 8259B: IoT Non-Technical Supporting Capability Core Baseline
0 22 days ago by Michael
RSAC Marketplace 0 22 days ago by Orbert
NIST SP1800-13, Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders
0 22 days ago by Michael
Simple effective cloud adoption and strategy
4 23 days ago by Claude
Original post by Rys
NSA Kubernetes Hardening Guidance
4 23 days ago by Jacques
Original post by Michael
#TechTopicTuesday 0 23 days ago by Orbert
EU Draft for Comment: Internet-connected radio equipment and wearable radio equipment
0 24 days ago by Michael
How-To: Securing Messaging in Mobile Apps
0 24 days ago by Orbert
CMVP Validation Authority Updates: Draft Revisions of NIST SP 800-140C/D/F Available for Comment
0 26 days ago by Michael
#repost - I love the uptick in ransomware 8 27 days ago by Danilo caio da silva vieira
Original post by Olivia