• HOME

  • Network

    • Network Tools
    • Routing
    • Switching
    • Packet Analysis
  • Vendors

    • Cisco
      • Cisco Products
      • Featured Tools
      • Software Central
      • Cisco Community
      • Learning Network
    • Extreme
      • Extreme Products
      • Products Home
      • Community Hub
      • Knowledge Search
      • Dojo Training
    • HPE
      • Networking
      • Community
      • Training
    • Arista
      • Arista Products
      • Forum
      • Training
    • Juniper
      • Juniper Products
      • J-Net Community
      • Learning Portal
    • PAN
      • Products A-Z
      • LIVEcommunity/KB
      • TechDocs
      • Beacon (training)
    • Fortinet
      • Fortinet Products
      • Fuse Community
      • Docs Library
      • Training
    • Check Point
      • Check Point Products
      • CheckMates Community
      • Knowledge Search
      • Training
    • F5
      • Products
      • Community
      • Knowledge Search
      • Training
    • Citrix
      • Products
      • Community
      • Knowledge Search
      • Training
    • A10
      • Products
      • Community
      • Knowledge Search
      • Training
  • Cybersecurity

    • Advisory
    • Guide
    • Firewall
    • Threat Database
    • Vendors
  • IT

    • Certifications
    • Data center
  • Resources

    • Recommended Links
      • Network
        • Outage Status
      • Cybersecurity
        • CISSP Training
      • IT
        • Online Courses
    • Recommended Books
    • Tech Events
    • Blogroll
  • Tags

  • About

AnalysisMan

Imagination + Faith = Creation

Sunday, April 3, 2022

Cybersecurity Guides and Best Practices


Here I will share good resources for cybersecurity guides and best practices.


  • CERT


▶ CERT/CC

CERT NZ guide - Protecting from ransomware

▶ CISA

CISA - Shields Up
2022 CWE Top 25 Most Dangerous Software Weaknesses
Cybersecurity Information Sheet (CIS) - Keeping PowerShell: Measures to Use and Embrace - PDF
Cloud Security (CS) Technical Reference Architecture (TRA) - PDF
Zero Trust Guidance for Enterprise Mobility - PDF
Capability Enhancement Guide (CEG): Social Media Account Protection
CISA and NSA's Kubernetes Hardening Guidance - PDF
CISA's Cybersecurity Best Practices for Industrial Control Systems (ICS)


  • Vendors


▶ Cisco Systems

Cisco Security Advisories

▶ Palo Alto Networks

Palo Alto Networks Security Advisories

▶ Fortinet

PSIRT Advisories


▶ Others

Cobalt - The Buyer's Guide to Modern Pantesting - Download
Recorded Future - The Threat Intelligence Buyer's Guide - Download
Recorded Future - The Intelligence Handbook, Fourth Edition - Download
The NordPass Guide to Cyber Insurance in 2022 - Download



  • Software


▶ Microsoft




Posted by AnalysisMan's Blog at 10:00 PM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: CERT, Cybersecurity

No comments:

Post a Comment

Newer Post Older Post Home

About Network + Security

About Network + Security

Search This Blog

Featured Post

Palo Alto firewall - Troubleshooting High DP CPU

Popular Posts

  • Free Visio Stencils Download for Network Diagram
  • How to add and delete Static Routes on macOS (persistently)
  • Extreme Switch - Reset to factory default when the password is unknown
  • Palo Alto firewall - Reset to Factory Default (3 cases)
  • Extreme Switch - Reset to factory default
  • Palo Alto firewall - How to configure the Management IP via CLI
  • Extreme Switch - How to backup/restore configuration in EXOS

Tags

802 A10 ACL AD·LDAP ADC AI Amazon AntiVirus·AntiSpyware Apple Arista Automation Avaya AWS Azure BGP Blog Brocade CCIE CERT Certifications ChatGPT Cisco Citrix CLI Cloud Coding CPU Cybersecurity Datacenter DellEMC Design DHCP DNS Encryption ESET ESXi EVE-NG EXOS Extreme Fabric FireEye Firewall Fortinet Free GCP GlobalProtect GNS3 Google HA Habit Hacking HPE IDS·IPS IPsec ISP IT Juniper Linux macOS Malware Microsoft MLAG NAC Network NPM Nutanix Nvidia Obsidian OPNsense OSPF PacketAnalysis PaloAltoNetworks Panorama Protocol Python Routing Science SD-WAN SecondBrain SLB SLX-OS SolarWinds SSL·TLS Stacking STP Switching TAC Threat Tools Training Troubleshooting Upgrades Vendors VLAN VMware VOSS VPN VRRP Vulnerability VXLAN Windows Wireless Wireshark XIQ Zettelkasten
Tweets by AnalysisManTwit

Blog Archive

  • Home
Copyright © 2023 AnalysisMan - All Rights Reserved.