The Inner Circle

 View Only

Latest Discussion Posts

  • Hi All, @James Angle This report attempts to look closer at specific use cases relating to personal data sharing, primarily in the health sector. It discusses how specific technologies and considerations of implementation can support the meeting of ...

  • Hi All, NIST just published Federal Information Processing Standard (FIPS) 186-5, Digital Signature Standard (DSS), along with NIST Special Publication (SP) 800-186, Recommendations for Discrete Logarithm-based Cryptography: Elliptic Curve Domain Parameters. ...

  • Hi All, There have been a number of developments in technology, such as the Internet of Things (IoT), decentralized infrastructures, and growing regulatory and consumer concerns about data privacy. The need for paperless authentication during the COVID-19 ...

  • Hi All, What once started out as a quick way to help friends and family has now turned into a bigger project that is serving a much bigger purpose... GOAL: Educate the everyday tech user on personal cybersecurity best practices. 6 months ...

    1 person likes this.
  • Hi All, The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) (hereafter referred to as the "authoring organizations") are releasing this joint Cybersecurity ...


  • February Research Releases

    STAR Enabled Solutions FAQ
    Release Date: 2/1/23
    Summary: A STAR Enabled Solution is a product or service that utilizes the CCM framework or the Consensus Assessment Initiative Questionnaire (CAIQ). Their technologies and tools have been assessed and found to meet the security requirements outlined by CSA. This vetting process allows enterprises to more easily deploy tools that align or comply with STAR, the CCM framework, and best practices.
    Download this Resource →

  • January Research Releases

    Telesurgery Tabletop Guide Book
    Release Date: 1/30/23
    Summary: The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response actions to a security incident in which a Robotic Assisted Surgery (RAS) is targeted. This guidebook should accompany the CERT Attack Flows here in GitHub. Healthcare professionals should utilize this resource as a planning guide and checklist for each stage of exercise development. 
    Download this Resource →

    CSA Data Lake Threat Modeling
    Release Date: 1/26/23
    Summary: As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With the help from NTT Data and Marymount University, CSA has released for peer review our Data Lake threat modeling exercise spreadsheet. In this document, numerous elements of data lakes have been taken into consideration and have been applied a specific threat scenario. Each one of these scenarios has been applied to the STRIDE framework, as well as been provided countermeasures for possible corrections and controls. Lastly, you will be able to see the mapping of each threat scenario to its specific attack library framework. 
    Download this Resource →

    ACSP Training Course Outline | CSA
    Release Date: 1/17/23
    Summary: An outline of the topics covered and what you'll be building in the labs each day of the Advanced Cloud Security Practitioner (ACSP) Training. 
    Download this Resource →

  • Upcoming Cloudbytes Webinars

    Secure-by-default: Scaling your IaC Security Program
    Date: 2/28/23
    Time: 10:00 AM CST
    Register Here →