Top Threats

1 to 50 of 209 threads (267 total posts)
  Thread Subject Replies Last Post Status
Pandemic Eleven Typos
0 yesterday by Ben Robinson
NIST SP 800-215 Guide to a Secure Enterprise Network Landscape
0 4 days ago by Michael Roza
ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS
0 10 days ago by Michael Roza
Trust Services Security Incidents 2021
0 13 days ago by Michael Roza
ISO/IEC 27036-2:2022 Cybersecurity - Supplier relationships - Part 2: Requirements
0 19 days ago by Michael Roza
NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Call for Comments
0 21 days ago by Michael Roza
NSA CTR DoD Microelectronics: Levels of Assurance Definitions and Applications
0 26 days ago by Michael Roza
Recommendations for using a Customer Controlled Key Store Open for Peer Review
0 27 days ago by Michael Roza
ENISA Cybersecurity Threat Landscape Methodology
0 one month ago by Michael Roza
The ENISA CONSOLIDATED ANNUAL ACTIVITY REPORT 2021
0 one month ago by Michael Roza
FedRAMP Penetration Test Guidance Version 3
0 one month ago by Michael Roza
NIST SP 800-219 Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)
0 one month ago by Michael Roza
NSA: CSI Keeping PowerShell: Security Measures to Use and Embrace
0 one month ago by Michael Roza
CISA Trusted Internet Connections 3.0 Cloud Use Case June 2022 Version 1.0
0 one month ago by Michael Roza
NSA CTR Network Report Infrastructure Security Guide
0 one month ago by Michael Roza
NIST releases Cybersecurity White Paper 26 Ordered tway Combinations for Testing State-based Systems
0 one month ago by Michael Roza
NIST IR 8286D Using Business Impact Analysis to Inform Risk Prioritization and Response draft for comment
0 2 months ago by Michael Roza
NIST IR 8409 Measuring the Common Vulnerability Scoring System Base Score Equation Draft for Comment
0 2 months ago by Michael Roza
NIST SP 800-160 Volume 1 Engineering Trustworthy Secure Systems: Final Public Draft is Available for Comment
0 2 months ago by Michael Roza
NSA State-Sponsored Cyber Actors Exploit Network Providers and Devices
0 2 months ago by Michael Roza
Top Threats to Cloud Computing: Egregious Eleven
0 2 months ago by Ibrahim Bin Asaker
Peer Review ending soon (May 21st): Top Threats to Cloud Computing Pandemic Eleven
0 2 months ago by Shamun Mahmud
ENISA Research and Innovation Brief - Annual Report on Cybersecurity Research and Innovation Needs and Priorities
0 2 months ago by Michael Roza
Joint Cybersecurity Advisory Protecting Against Cyber Threats to Managed Service Providers and their Customers
0 3 months ago by Michael Roza
NSA CSA Protecting VSAT Communications
0 3 months ago by Michael Roza
NIST SP 800-161 Revision 1 Cybersecurity Supply Chain Risk Management Practices for Systems and Organization
0 3 months ago by Michael Roza
Joint Cybersecurity Advisory 2021 Top Routinely Exploited Vulnerabilities
0 3 months ago by Michael Roza
Joint Cybersecurity Advisory Russian State Sponsored and Criminal Cyber Threats to Critical Infrastructure
0 3 months ago by Michael Roza
NISTIR 8320C Draft Hardware Enabled Security: 2 Machine Identity Management and Protection
0 3 months ago by Michael Roza
NIST.IR.8320B Hardware-Enabled Security: Policy-Based Governance in Trusted Container Platforms
0 3 months ago by Michael Roza
NIST/NCCOE Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments
0 3 months ago by Michael Roza
ENISA Coordinated Vulnerability Disclosure Policies in the EU
0 3 months ago by Michael Roza
ISO/IEC TS 22237-30:2022 Information technology - Data centre facilities and infrastructures - Part 30: Earthquake risk and impact analysis
0 3 months ago by Michael Roza
ISO/IEC 19944-2:2022 Cloud computing and distributed platforms - Data flow, data categories and data use - Part 2: Guidance on application and extensibility
0 3 months ago by Michael Roza
NIST - Final Publications on Enterprise Patch Management Released
0 4 months ago by Michael Roza
Consolidated Appropriations Act 2022 that includes the Cyber Incident Reporting for Critical Infrastructure Act of 2022
0 4 months ago by Michael Roza
ENISA European Cybersecurity Month 2021 - Deployment report
0 4 months ago by Michael Roza
ISO 28000:2022 Security and resilience - Security management systems - Requirements
0 4 months ago by Michael Roza
NASA Office of Inspector General Office of Audits - NASA'S Insider Threat Program Audit Results
0 4 months ago by Michael Roza
IEC TR 63283-2:2022 Industrial-process measurement, control and automation - Smart Manufacturing - Part 2: Use cases
0 4 months ago by Michael Roza
ENISA Risk Management Standards
0 4 months ago by Michael Roza
NSA CISA CTR_Kubernetes_Hardening_Guidance_1.1
0 4 months ago by Michael Roza
NIST SP 800-172A, Assessing Enhanced Security Requirements for Controlled Unclassified Information
0 4 months ago by Michael Roza
ENISA Cyber Threats Outreach In Telecom
0 5 months ago by Michael Roza
NSA CISA FBI Secret Service_Conti_Ransomware advisory updated March 09, 2022
0 5 months ago by Michael Roza
NSA CISA FBI_Conti_Ransomware advisory updated February 28, 2022
0 5 months ago by Michael Roza
NIST Released the Final Ransomware Risk Management Cybersecurity Framework Profile & Quick Start Guide
0 5 months ago by Michael Roza
NSA CTR Network Report Infrastructure Security Guidance
0 5 months ago by Michael Roza
CSA: New Sandworm malware Cyclops Blink replaces VPNFilter
0 5 months ago by Michael Roza
NSA Cisco Password Types: Best Practices
0 5 months ago by Michael Roza