Search
Results
D3FEND Matrix | MITRE D3FEND™
MITRE ATT&CK®
The Penetration Testing Execution Standard
OWASP Web Security Testing Guide | OWASP Foundation
Eric Zimmerman tools
VirusTotal
CIC Honeynet
OWASP Web Security Testing Guide | OWASP Foundation
INE Security - INE Security
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
Security Certification Roadmap - Paul Jerimy Media
TzuHuanTai/RaspberryPi_WebRTC: Native WebRTC uses v4l2 hardware h264 and software openh264 encoder for live streaming on Raspberry Pi.
Is Telegram, Ukraine’s most popular messenger app, a Russian Trojan horse?
[https://kyivindependent.com/is-ukraines-most-popular-messenger-app-a-russian-trojan-horse/] - - public:mzimmerm
Telegram is neither “secure“ nor “encrypted“ | Songs on the Security of Networks
Keep Pavel Durov LOCKED UP
NumCheckr - Detect disposable and virtual phone numbers
xaitax/CVE-2024-6387_Check: CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Payloads All The Things
[https://swisskyrepo.github.io/PayloadsAllTheThings/] - - public:realjck
A collection of useful payloads and bypasses for web application security, serving as a reference for penetration testing.
nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
How to Create a Temporary SOC 2 Alternative| IANS Research
[https://www.iansresearch.com/resources/all-blogs/post/security-blog/2022/07/07/how-to-create-a-temporary-soc-2-alternative] - - public:mepage
Information Security Policy Templates | SANS Institute
3S กับโครงการ OAP Award | วิฑูรย์ สิมะโชคดี
กรอบการทำงานของ 22 หน่วยงานภายใต้กระทรวงเกษตรและสหกรณ์ ขับเคลื่อนร่วมกัน “3S” คือ “Safety“ ความปลอดภัยของอาหาร “Security“ ความมั่นคง มั่งคั่ง ของภาคการเกษตรและอาหาร และ “Sustainability“ ความยั่งยืนของภาคการเกษตร วันที่ 30 กันยายน 2563 การเกษตรต่างประเทศ
microsoft/Security-101: 7 Lessons, Kick-start Your Cybersecurity Learning.
Mozilla Foundation Security Advisories
Essential Eight Maturity Model | Cyber.gov.au
[https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight/essential-eight-maturity-model] - - public:stevetao
המדריך לאבטחה מקסימלית בוואטסאפ
Qualified website authentication certificate - Wikipedia
Home - Mozilla | QWACs - #SecurityRiskAhead EU
Learn and Test DMARC
Internet without passwords: What you need to know about passkeys now
Ask HN: IP cameras that don't require an app or internet? | Hacker News
Communicate Better with the Organizational Security Maturity Model
[https://fractionalciso.com/communicate-better-with-the-organizational-security-maturity-model/] - - public:stevetao
NIST CSF – Cyber Oak Solutions
Level Setting Supplier Cybersecurity Maturity | Motional
What Is the DoD’s New Cybersecurity Maturity Model Certification, and What Does It Mean for Defense - Coalfire
[https://www.coalfire.com/the-coalfire-blog/dod-new-cybersecurity-maturity-model-cert] - - public:stevetao
Achieving cybersecurity maturity within your law firm - Thomson Reuters Institute
[https://www.thomsonreuters.com/en-us/posts/legal/practice-innovations-april-2021-cybersecurity-maturity/] - - public:stevetao
Cask and the Cybersecurity Maturity Model Certification (CMMC) - Cask
[https://caskgov.com/resources/cask-and-the-cybersecurity-maturity-model-certification/] - - public:stevetao
Cyber Security Maturity Assessment - ENSL Group | AI Driven Cyber Security & Digital Transformation
CMMC : Cybersecurity Maturity Model Certification - ALL4TEC
[https://www.all4tec.com/en/blog/guides-en/cybersecurity-maturity-model-certification/] - - public:stevetao
The Need for a Cybersecurity Maturity Assessment
[https://www.frost.com/frost-perspectives/the-need-for-a-cybersecurity-maturity-assessment/] - - public:stevetao
Cyber Security Analyst Maturity Curve
4 Phases of Cybersecurity Maturity - All Articles - CISO Platform
[https://www.cisoplatform.com/profiles/blogs/4-phases-of-cybersecurity-maturity] - - public:stevetao
Cybersecurity Capability Maturity Model (C2M2) | Department of Energy
Step-by-Step Compliance for the Cybersecurity Maturity Model Certification (CMMC) - Microsoft Community Hub
[https://techcommunity.microsoft.com/t5/public-sector-blog/step-by-step-compliance-for-the-cybersecurity-maturity-model/ba-p/3745058] - - public:stevetao
What Is CMMC? Cybersecurity Maturity Model Certification | BigID
[https://bigid.com/blog/what-is-cmmc-cybersecurity-maturity-model-certification/] - - public:stevetao
Cybersecurity Maturity Wheel | e92plus
How to Use a Cybersecurity Maturity Model - SecurityGate.io
CMMC - the DoD's Cybersecurity Maturity Model Certification | Authentic8
[https://www.authentic8.com/blog/cmmc-cybersecurity-maturity-model-certification] - - public:stevetao
