• HOME

  • Network

    • Network Tools
    • Routing
    • Switching
    • Packet Analysis
  • Vendors

    • Cisco
      • Cisco Products
      • Featured Tools
      • Software Central
      • Cisco Community
      • Learning Network
    • Extreme
      • Extreme Products
      • Products Home
      • Community Hub
      • Knowledge Search
      • Training
    • HPE
      • Networking
      • Community
      • Training
    • Arista
      • Arista Products
      • Forum
      • Training
    • Juniper
      • Juniper Products
      • J-Net Community
      • Learning Portal
    • PAN
      • Products A-Z
      • LIVEcommunity/KB
      • TechDocs
      • Beacon (training)
    • Fortinet
      • Fortinet Products
      • Fuse Community
      • Docs Library
      • Training
    • Check Point
      • Check Point Products
      • CheckMates Community
      • Knowledge Search
      • Training
    • F5
      • Products
      • Community
      • Knowledge Search
      • Training
    • Citrix
      • Products
      • Community
      • Knowledge Search
      • Training
    • A10
      • Products
      • Community
      • Knowledge Search
      • Training
  • Cybersecurity

    • Advisory
    • Guide
    • Firewall
    • Threat Database
    • Vendors
  • IT

    • Certifications
    • Data center
  • Resources

    • Recommended Links
      • Network
        • Outage Status
      • Cybersecurity
        • CISSP Training
      • IT
        • Online Courses
    • Recommended Books
    • Tech Events
    • Blogroll
  • Tags

  • About

AnalysisMan

Imagination + Faith = Creation

Sunday, April 3, 2022

Cybersecurity Guides and Best Practices


Here I will share good resources for cybersecurity guides and best practices.


  • CERT


▶ CERT/CC

CERT NZ guide - Protecting from ransomware

▶ CISA

CISA - Shields Up
2022 CWE Top 25 Most Dangerous Software Weaknesses
Cybersecurity Information Sheet (CIS) - Keeping PowerShell: Measures to Use and Embrace - PDF
Cloud Security (CS) Technical Reference Architecture (TRA) - PDF
Zero Trust Guidance for Enterprise Mobility - PDF
Capability Enhancement Guide (CEG): Social Media Account Protection
CISA and NSA's Kubernetes Hardening Guidance - PDF
CISA's Cybersecurity Best Practices for Industrial Control Systems (ICS)


  • Vendors


▶ Cisco Systems

Cisco Security Advisories

▶ Palo Alto Networks

Palo Alto Networks Security Advisories

▶ Fortinet

PSIRT Advisories


▶ Others

Cobalt - The Buyer's Guide to Modern Pantesting - Download
Recorded Future - The Threat Intelligence Buyer's Guide - Download
Recorded Future - The Intelligence Handbook, Fourth Edition - Download
The NordPass Guide to Cyber Insurance in 2022 - Download



  • Software


▶ Microsoft




Posted by AnalysisMan's Blog at 10:00 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: CERT, Cybersecurity

No comments:

Post a Comment

Newer Post Older Post Home

About Network + Security

About Network + Security

Search This Blog

Featured Post

Palo Alto firewall - Troubleshooting High DP CPU

Popular Posts

  • How to add and delete Static Routes on macOS (persistently)
  • Free Visio Stencils Download for Network Diagram
  • Extreme Switch - Reset to factory default when the password is unknown
  • Palo Alto firewall - Reset to Factory Default (3 cases)
  • Palo Alto firewall - How to clean up disk space
  • Palo Alto firewall - How to configure the Management IP via CLI
  • Extreme Switch - Reset to factory default

Tags

802 A10 ACL AD·LDAP ADC AI Amazon Ansible AntiVirus·AntiSpyware Apple Arista Automation Avaya AWS Azure BGP Blog Brocade CCIE CERT Certifications ChatGPT Cisco Citrix CLI Cloud Coding CPU Cybersecurity Datacenter DellEMC Design DHCP DNS Encryption ESET ESXi EVE-NG EXOS Extreme Fabric FireEye Firewall Fortinet Free GCP GlobalProtect GNS3 Google HA Habit Hacking HPE IDS·IPS IPsec ISP IT Juniper Linux macOS Malware Microsoft MLAG NAC Network NPM Nutanix Nvidia Obsidian OPNsense OSPF PacketAnalysis PaloAltoNetworks Panorama Protocol Python Routing Science SD-WAN SecondBrain SLB SLX-OS SolarWinds SSH SSL·TLS Stacking STP Switching TAC TCP/IP Threat Tools Training Troubleshooting Upgrades Vendors VLAN VMware VOSS VPN VRRP Vulnerability VXLAN Windows Wireless Wireshark XIQ Zettelkasten ZTNA

Links

  • LinkedIn Posts
  • AnalysisMan's Second Brain

Blog Archive

  • Home
Copyright © 2025 AnalysisMan - All Rights Reserved.