NIST Special Publications (SP) 800-Series
Summary The NIST 800 SP-800 Series is a set of special publications that describe United States federal government computer security policies, procedures, and guidelines. This grouping of special ...
Summary The NIST 800 SP-800 Series is a set of special publications that describe United States federal government computer security policies, procedures, and guidelines. This grouping of special ...
Summary The NIST Cybersecurity Framework (CSF) is used to help an organization improve their cybersecurity program & posture. It focuses on using business drivers to guide cybersecurity activit...
Introduction Governance, Risk, and Compliance (GRC) is a structured way to align IT with business goals while managing risks and meeting all industry and government regulations. Companies use GRC...
Introduction Developed by Lockheed Martin, the Cyber Kill Chain framework is utilized for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must...
Introduction (Control Objectives for Information and related Technologies) The COBIT control model guarantees the integrity of the information system. COBIT ensures quality, control, and reliabil...
Introduction These 20 critical security controls (CSC) were developed by the Center for Internet Security (CIS) and the SANS Institute. This framework is presented in a format that can be easily ad...
Introduction The Diamond Model of Intrusion Analysis doesn’t follow a linear flow as the other intrusion models (MITRE ATT&CK, Kill Chain). The creators of The Diamond Model (Sergio Caltagiro...
Introduction (Adversarial Tactics, Techniques, & Common Knowledge) The MITRE ATT&CK framework serves as an encyclopedia of previously observed tactics from threat actors. It helps securit...
Introduction The Information Security Management Standard (ISO 27001) was first published in 2005 and has now seen a recent update in 2022. The ISO 27001 is the international standard used to miti...
Introduction There’s been an alarming increase of cyberattacks and data breaches. Even the largest of organizations with the best cyber security infrastructure and strongest security operations ca...