Identity Underground

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

Menu

  • About me
    • Short Bio
    • Publications
    • Speaking Engagements
    • My Presentations – Downloads & handouts
    • LinkedIn Connection Suggestion
  • Data Protection
    • Databreach reports
    • eID (BE) reference material
    • Useful GDPR resources
    • CIPM Companion links
    • GDPR reference material
  • Identity
    • Microsoft Identity Manager news
    • Microsoft Identity reference pages
    • Other blogs
  • Information Security
    • ISO27001 & ISO27002 DOWNLOADS & TOOLS
  • Cybersecurity & Cloud security
    • Cybersecurity Reference material
    • Ethical hacking – useful resources (curation)
    • References on public ransomware, cybercrime and databreaches (for educational purposes)
    • Useful cybersecurity & breach reports
  • Note-to-self: reference braindump
  • Out-of-scope – Something Different

Useful cybersecurity & breach reports

(updated 2021-07-29)

  1. Cyber Threat Landscape reports
    1. 2021
      1. 2021 CyberThreat Defense report CyberEdge & (ISC)²
      2. Crowdstrike
      3. Kroll – State of incident response
      4. ENISA Threat landscape report 2021
    2. 2020
      1. CyberEdge
    3. ENISA

Cyber Threat Landscape reports

2021

2021 CyberThreat Defense report CyberEdge & (ISC)²

https://www.isc2.org/-/media/ISC2/Research/Cyberthreat-Defense-Report/2021/CyberEdge-2021-CDR-Report-v10–ISC2-Edition.ashx

Crowdstrike

Click to access Report2021GTR.pdf

Kroll – State of incident response

(no need to pay with your privacy)

Click to access state-of-incident-response-2021.pdf

ENISA Threat landscape report 2021

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021

2020

CyberEdge

CyberEdge’s 2020 Cyberthreat Defense Report

Including

  • Executive brief
  • Infograph

Click to access the main report: Report/CyberEdge-2020-CDR-Report-v10.ashx?la=enhttps://www.isc2.org/-/media/ISC2/Research/Cyberthreat-Defense-

Hiscox Cyber Readiness Report 2020

https://www.hiscox.be/sites/www.hiscox.be/files/HSX089%202020%20Cyber%20Readiness%20Report_Web.pdf

ENISA

Overview: https://www.enisa.europa.eu/news/enisa-news/enisa-threat-landscape-2020

Detailed report per topic (with massive list of references to use): https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends

Share this:

  • LinkedIn
  • Twitter
  • Email
  • Facebook
  • Skype

Like this:

Like Loading...
  • LinkedIn
  • Twitter
  • GitHub
Follow Identity Underground on WordPress.com

Author

Root of existence (life motto)

No security without identity -
No identity without security

Blog Stats

  • 292,456 hits

Search this blog

Visitor Map

Blog post history

Blog post overview

March 2023
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Feb    

Top 10 of my most popular posts & pages (views)

  • Note-to-Self: workaround for bcc (blind copy) of meeting requests in Outlook
  • ISO27001 & ISO27002 DOWNLOADS & TOOLS
  • #ICYMI, check these online fully accessible + freely downloadable ISO standards, relevant for information security, privacy & data protection
  • list all SPNs used in your Active Directory
  • Extended mapping of CIS Controls to ISO27001 security controls
  • Note-to-self: DNS naming best practices for internal domains and networks
  • Signing a PDF with Belgian eID - step-by-step for beginners (a bit more then what they tell you on the official page)
  • Outlook troubleshooting: Outlook keeps prompting for password
  • There is nothing new in the 2022 version of ISO27001 and ISO27002. [aka: How to match 2022 with 2013 version and easily fix your Statement of applicability (SoA).]
  • Note-to-self: SOC2 mapping to ISO27001

This blog RSS

RSS Feed RSS - Posts

RSS Feed RSS - Comments

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,995 other subscribers

Follow me on Twitter

My Tweets

Follow the TNWiki

  • TNWIKI
  • TNWiki on Twitter
  • Me at TNWiki

Azure Active Directory best practices Community corporate security cybersecurity data privacy data protection download enterprise security FIM FIM2010 FIM 2010 fim 2010 R2 fim2010R2 Forefront Security GDPR general interest guidance Hotfix ILM Learning Microsoft mim mim2016 mim 2016 Note-to-self privacy Security troubleshooting Winsec

Blog tags

AAD AADSync active directory AD Award azure Azure AD Azure AD Sync best practices Beta book ccsk cloud cloud security community Connect cybersecurity cybersecurity report data protection download ebook ECMA eid enterprise mobility enterprise security feedback FIM FIM2010 FIM 2010 FIM 2010 R2 FIM 2010 R2 SP1 FIM2010R2 GDPR github guide hotfix identity identity and access ISO27001 learning legal licensing mail microsoft MIM mim 2015 mim2015 mim2016 mim 2016 mva MVP note-to-self o365 office 365 outlook packt password PECB powershell privacy roadmap scm security security compliance manager sharepoint speaking SQL techdays technet tnwiki tools troubleshooting webinar wiki winsec

My favorite Links

  • Current Forefront Identity Manager Resources
  • Current CLM resources
  • Current ILM resources
  • ILM FIM Glossary
  • FIM 2010 webcasts
  • Winsec.be
  • Identity Underground
  • Current ADFS resources
wordpress hit counter

Copyright

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.

Communication policy

- I don't return private and anonymous calls
- I don't take anonymous calls by default (had way to much anonymous calls from marketing guys and fake support engineers telling my computer is broke)

Social Media Policy

- I will only accept Facebook friend requests from people I know in person.

- I will only accept LinkedIn requests from professional people I have worked with or had at least a few email exchanges with (remind me on the request if this is the case).

- Of course, you are welcome to follow me on this blog, twitter (https://twitter.com/geelenp) or LinkedIn (https://www.linkedin.com/in/pgeelen).

Follow MIM2016 on Twitter

My Tweets
Follow Identity Underground on WordPress.com

Identity Management and Access

  • Microsoft MVP Program
    • Tomasz Onyszko
    • Jorge de Almeida Pinto
    • Naohiro Fujie (Japanese)
    • Søren Granfeldt
    • Eihab Isaac
    • Joris FAURE
    • Peter Stapf
    • Sylvain Cortes
    • Kent Nordström
  • FIM @ Microsoft
    • IAM Support blog
    • Connector Space blog
    • Anthony Ho

Directory Services

  • Gil Kirckpatrick’s Blog (MVP DS)
  • Jorge ‘s Quest For Knowledge (MVP DS)
  • Laura Hunter’s Rants and Raves
  • Jackson Shaw

Blogs I Follow

  • Kloud Site
  • Jorge's Quest For Knowledge!
  • IdM for Real
  • MIM/FIM / ILM Best Practices (Forefront Identity Manager)
  • Cloud Platform News Bytes Blog
  • Solve your Identity crisis without therapy
  • TechNet Blogs
  • Search Msdn
  • be-Id
  • MIM/FIM / ILM Best Practices (Forefront Identity Manager)

PKI

  • Card Deployment Cookbook

My Favorite Books

  • Microsoft Windows Server 2003 PKI and Certificate Security
  • Windows Server 2008 PKI and Certificate Security
  • The Active Directory Cookbook – 3rd edition
  • Microsoft Forefront Identity Manager 2010 R2 Handbook
  • FIM Best Practices Vol. 1
  • Windows Server 2012 Unified Remote Access Planning and Deployment
  • Microsoft Forefront UAG 2010 Administrator’s Handbook
  • Mastering Microsoft Forefront UAG 2010 Customization

Windows Identity Foundation / Cardspace

  • Claims-Based Identity Blog
  • Kim Cameron
  • Pamela Dingle
  • Pamela Project
  • Vibro.NET
  • Introducing Windows CardSpace

Other Resources

  • Free .NET Code Converters and Source Viewer – Developer Fusion Labs
  • The Code Project – Free Source Code and Tutorials
  • Regular Expressions – a Simple User Guide
  • Regular Expressions
  • Microsoft Virtual Labs
Blog at WordPress.com.
Kloud Site

Jorge's Quest For Knowledge!

All About Identity And Security On-Premises And In The Cloud - It's Just Like An Addiction, The More You Have, The More You Want To Have!

IdM for Real

Event driven identity management on the Microsoft Identity platform

MIM/FIM / ILM Best Practices (Forefront Identity Manager)

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

Cloud Platform News Bytes Blog

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

Solve your Identity crisis without therapy

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

TechNet Blogs

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

Search Msdn

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

be-Id

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

MIM/FIM / ILM Best Practices (Forefront Identity Manager)

My connector space to the internet metaverse (also my external memory, so I can easily share what I learn)

  • Follow Following
    • Identity Underground
    • Join 144 other followers
    • Already have a WordPress.com account? Log in now.
    • Identity Underground
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
%d bloggers like this: