• HOME

  • Network

    • Network Tools
    • Routing
    • Switching
    • Packet Analysis
  • Vendors

    • Cisco
      • Cisco Products
      • Featured Tools
      • Software Central
      • Cisco Community
      • Learning Network
    • Extreme
      • Extreme Products
      • Products Home
      • Community Hub
      • Knowledge Search
      • Training
    • HPE
      • Networking
      • Community
      • Training
    • Arista
      • Arista Products
      • Forum
      • Training
    • Juniper
      • Juniper Products
      • J-Net Community
      • Learning Portal
    • PAN
      • Products A-Z
      • LIVEcommunity/KB
      • TechDocs
      • Beacon (training)
    • Fortinet
      • Fortinet Products
      • Fuse Community
      • Docs Library
      • Training
    • Check Point
      • Check Point Products
      • CheckMates Community
      • Knowledge Search
      • Training
    • F5
      • Products
      • Community
      • Knowledge Search
      • Training
    • Citrix
      • Products
      • Community
      • Knowledge Search
      • Training
    • A10
      • Products
      • Community
      • Knowledge Search
      • Training
  • Cybersecurity

    • Advisory
    • Guide
    • Firewall
    • Threat Database
    • Vendors
  • IT

    • Certifications
    • Data center
  • Resources

    • Recommended Links
      • Network
        • Outage Status
      • Cybersecurity
        • CISSP Training
      • IT
        • Online Courses
    • Recommended Books
    • Tech Events
    • Blogroll
  • Tags

  • About

AnalysisMan

Imagination + Faith = Creation

Sunday, April 3, 2022

Cybersecurity Guides and Best Practices


Here I will share good resources for cybersecurity guides and best practices.


  • CERT


▶ CERT/CC

CERT NZ guide - Protecting from ransomware

▶ CISA

CISA - Shields Up
2022 CWE Top 25 Most Dangerous Software Weaknesses
Cybersecurity Information Sheet (CIS) - Keeping PowerShell: Measures to Use and Embrace - PDF
Cloud Security (CS) Technical Reference Architecture (TRA) - PDF
Zero Trust Guidance for Enterprise Mobility - PDF
Capability Enhancement Guide (CEG): Social Media Account Protection
CISA and NSA's Kubernetes Hardening Guidance - PDF
CISA's Cybersecurity Best Practices for Industrial Control Systems (ICS)


  • Vendors


▶ Cisco Systems

Cisco Security Advisories

▶ Palo Alto Networks

Palo Alto Networks Security Advisories

▶ Fortinet

PSIRT Advisories


▶ Others

Cobalt - The Buyer's Guide to Modern Pantesting - Download
Recorded Future - The Threat Intelligence Buyer's Guide - Download
Recorded Future - The Intelligence Handbook, Fourth Edition - Download
The NordPass Guide to Cyber Insurance in 2022 - Download



  • Software


▶ Microsoft




AnalysisMan's Blog at 10:00 PM
Share

No comments:

Post a Comment

‹
›
Home
View web version
▼