Top Threats

1 to 50 of 146 threads (204 total posts)
  Thread Subject Replies Last Post Status
FDA Announces Release of "Playbook for Threat Modeling Medical Devices"
0 20 hours ago by Michael Roza
NIST IoT Cybersecurity Guidance - SP 800-213 & SP 800-213A
0 yesterday by Michael Roza
ENISA - Raising Awareness of Cybersecurity - key element of NCSS
0 yesterday by Michael Roza
Insider Risk Mitigation Program Evaluation (IRMPE) Tool
0 5 days ago by Michael Roza
ENISA Railway Cybersecurity - Good Practices in Cyber Risk Management
0 6 days ago by Michael Roza
ENISA Foresight Challenges
0 8 days ago by Michael Roza
NIST Patch Management - Special Publication 1800-31 and SP 800-40 Revision 4 Comments Wanted
0 13 days ago by Michael Roza
NIST Patch Management -
0 13 days ago by Michael Roza
ENISA Report - NIS Investments 2021
0 14 days ago by Michael Roza
CISA New Federal Government Cybersecurity Incident and Vulnerability Response Playbooks
0 15 days ago by Michael Roza
The Homeland Security Systems Engineering and Development Institute, sponsored by the Department of Homeland Security and operated by MITRE, has released the 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list.
0 one month ago by Michael Roza
ENISA Threat Landscape 2021
0 one month ago by Michael Roza
NIST Comments Wanted on Draft Reports on Hardware-Enabled Security and Trusted Cloud
0 one month ago by Michael Roza
Joint Cybersecurity CISA, FBI, and NSA provides guidance concerning BlackMatter Ransomware.
0 one month ago by Michael Roza
NSA CSA Ongoing Cyber Threats to U.S. Water and Wastewater Systems
0 one month ago by Michael Roza
NSA Avoid Dangers of Wildcard TLS Certificates and the ALPACA Technique
0 one month ago by Michael Roza
NIST (SP) 800-214 2020 Cybersecurity and Privacy Program Annual Report,
0 2 months ago by Michael Roza
NSA Selecting and Hardening Remote Access VPN Solutions
0 2 months ago by Michael Roza
Cloud Events/Breaches
0 2 months ago by Jon-Michael C. Brook
ISO/IEC 19944-1:2020 Cloud computing and distributed platforms ─ Data flow, data categories and data use - Part 1: Fundamentals
0 2 months ago by Elrasheid Mohmed Adam
ISO/IEC 27036-1:2021 Cybersecurity - Supplier relationships - Part 1: Overview and concepts
0 2 months ago by Michael Roza
ENISA - Methodology for a Sectoral Cybersecurity Assessment
0 2 months ago by Michael Roza
NISTIR 8374 Draft The Cybersecurity Framework Profile for Ransomware Risk Management,
0 2 months ago by Michael Roza
NSA Keeping Safe on Social Media Update
0 3 months ago by Michael Roza
ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS
0 4 months ago by Michael Roza
ENISA Trust Services Security Incidents 2020 - Annual Report
0 4 months ago by Michael Roza
ENISA Telecom Security Incidents 2020 - Annual Report
0 4 months ago by Michael Roza
NIST SP 800-47 Rev. 1 Managing the Security of Information Exchanges
0 4 months ago by Michael Roza
NSA State Sponsored Top Threats
0 4 months ago by Michael Roza
NIST Delivers on Two Key Publications to Enhance Software Supply Chain Security Called for by Executive Order
0 4 months ago by Michael Roza
NSA Cybersecurity Technical Report Deploying Secure Communications Voice and Video Over IP Systems
0 5 months ago by Michael Roza
NIST Cybersecurity White Paper, Combinatorial Coverage Difference Measurement, is now available for public comment.
0 5 months ago by Michael Roza
CISA Rising Ransomware Threat to Operational Technology Assets
0 5 months ago by Michael Roza
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement
0 6 months ago by Michael Roza
CISA AR21-134A Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise
0 6 months ago by Michael Roza
NSA Cybersecurity Advisory: Further TTPs associated with SVR cyber actors
0 6 months ago by Michael Roza
BakerHostetler (Law Firm) 2021 Data Security Incident Response Report – Disruption and Transformation A MUST READ
0 6 months ago by Michael Roza
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement
0 7 months ago by Michael Roza
FedRAMP Incident Communications Procedures V4.0
0 7 months ago by Michael Roza
Top 10 Threat Must be Solve Before 2025
0 7 months ago by Elrasheid Mohmed Ahmed Elrayah Elrayah
CSA International Standardization Council
1 8 months ago by Timothy Layton
Original post by Vic Hargrave
NIST SP1800-27, Securing Property Management Systems.
0 8 months ago by Michael Roza
Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile For Comment
0 8 months ago by Michael Roza
Questions about Top Threats to Cloud Computing: Egregious Eleven Deep Dive
6 9 months ago by Jon-Michael C. Brook
Original post by Masahiro Morozumi
NISTIR 8276, Key Practices in Cyber Supply Chain Risk Management (C-SCRM): Observations from Industry
0 9 months ago by Michael Roza
Questions about Top Threats to Cloud Computing: Egregious Eleven
1 9 months ago by Jon-Michael C. Brook
Original post by Masahiro Morozumi
NSA Eliminating Obsolete Transport Layer Security (TLS) Protocol Configurations 20200105
0 10 months ago by Michael Roza
NIST SP 1800-24: Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector
0 11 months ago by Michael Roza
NSA Detecting Abuse of Authentication Mechanisms
0 11 months ago by Michael Roza
ENISA AI CYBERSECURITY CHALLENGES Threat Landscape for Artificial Intelligence
0 11 months ago by Michael Roza