free isms Writing a SaaS vulnerability management policy using AI Learn the basics of writing simple, ISO-compliant, vulnerability management policies for SaaS companies
free isms Free SaaS ISMS quickstart Learn what it takes and what is needed to put together a free ISMS for SaaS companies
agile cybersecurity Agile cybersecurity basics Understand the fundamentals of implementing Agile methodologies within your security organisation
ai cybersecurity Creating an LLM AI security checklist for rapid fieldwork use Learn how security teams can help companies safely adopt LLM AIs by using a fieldwork checklist based on OWASP
azure sentinel labs Build an Azure Sentinel lab - part one: deployment automation basics Azure Sentinel is a key player in the cloud SIEM space. Learn the fundamentals by deploying a cheap, yet capable, lab
ai cybersecurity How to run data breach simulations Need to run a data breach simulation? Learn how to organise and execute them quickly and efficiently
ai cybersecurity Running rapid risk assessments using Google Gemini and Confluence Need to run a risk assessment for a project or tool? Learn how Gemini and Confluence can help you do it faster
free isms Build a free ISMS: how to create a great landing page A landing page is a key part of your ISMS. Learn how to create the perfect one to help your colleagues and auditors
cybersecurity metrics Confluence pentest reporting: simple KPIs to track remediation performance Need to track the remediation of pentest findings? Use confluence reporting tools to stay on top of the game
cybersecurity bootstrapping Building an awesome security wiki: tips and tricks for busy teams Are you leading a security team and have a documentation problem? Learn how to fix it today and save your future self
ciso skills Help I'm a new CISO! Tips to make a great impression on probation Have you managed to land your first CISO role? Great, now you need to quickly impress! Find out exactly how it's done
free isms How to build a free ISMS with ChatGPT ChatGPT can accelerate the creation of a free Information Security Management System. Find out how in this post