This GitHub page shows the CISO Tradecraft Podcast broken down by Topic
☆145Jan 2, 2026Updated 4 months ago
Alternatives and similar repositories for Podcast
Users that are interested in Podcast are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆266Jul 5, 2025Updated 10 months ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Some of the tools we use during vCISO engagements☆18Apr 23, 2022Updated 4 years ago
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆42Mar 2, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆22Jan 6, 2022Updated 4 years ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆1,021Sep 7, 2025Updated 8 months ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Mar 23, 2018Updated 8 years ago
- Discover Exposed AI Services☆80Apr 28, 2026Updated last week
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- ☆16Feb 15, 2022Updated 4 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆31Feb 6, 2026Updated 3 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,042Dec 21, 2024Updated last year
- ☆15Aug 20, 2019Updated 6 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆29Oct 10, 2023Updated 2 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Mindmaps about AWS based on public information☆131Jun 14, 2022Updated 3 years ago
- ☆1,055Apr 12, 2026Updated 3 weeks ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Solution for Auditing LAPS usage in an Active Directory environment.☆36Dec 11, 2015Updated 10 years ago
- ☆12May 19, 2025Updated 11 months ago
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Nov 22, 2022Updated 3 years ago
- MDM-ready scripts for detecting and monitoring OpenClaw (clawdbot, moltbot) on managed devices. Detect, audit and secure shadow AI agents…☆84Feb 17, 2026Updated 2 months ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated 2 months ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Apr 23, 2026Updated 2 weeks ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆65Mar 21, 2020Updated 6 years ago
- Tools to work with AWS IAM role assumption☆16Feb 13, 2019Updated 7 years ago