
Defensive Security Handbook

Only by understanding its specific threat landscape can an organization reduce risk. Controls are implemented according to the most significant threats. Threat analysis begins with the question, Which threat actors are trying to harm the organization and what are they capable of? In response, organizations can visualize the vulnerabilities commonly
... See moreJim Boehm • The Risk-Based Approach to Cybersecurity
Whoever is interested in embedding further backdoors has learned from the extensive public coverage of everything that went wrong. These mistakes have been pointed out, published and learned from. We have given the actors behind this backdoor free training for future attacks. It is time that distributions learn from this as well and also take train... See more
Dirk Mueller • What we need to take away from the XZ Backdoor

Let's keep in mind the words of Deputy Chairman Victor Zhora: "Resilience stems first from basic cyber hygiene." By prioritizing cybersecurity, planning for crises, and creatively reducing risk, we can build a more resilient future.