Blog on SecurityBLOG ON SECURITY
  • About this blog
Sign in Subscribe
Writing a SaaS vulnerability management policy using AI
free isms

Writing a SaaS vulnerability management policy using AI

Learn the basics of writing simple, ISO-compliant, vulnerability management policies for SaaS companies
Read More
Staff
Free SaaS ISMS quickstart
free isms

Free SaaS ISMS quickstart

Learn what it takes and what is needed to put together a free ISMS for SaaS companies
Read More
Staff
Agile cybersecurity basics
agile cybersecurity

Agile cybersecurity basics

Understand the fundamentals of implementing Agile methodologies within your security organisation
Read More
Staff
Creating an LLM AI security checklist for rapid fieldwork use
ai cybersecurity

Creating an LLM AI security checklist for rapid fieldwork use

Learn how security teams can help companies safely adopt LLM AIs by using a fieldwork checklist based on OWASP
Read More
Staff
Build an Azure Sentinel lab - part one: deployment automation basics
azure sentinel labs

Build an Azure Sentinel lab - part one: deployment automation basics

Azure Sentinel is a key player in the cloud SIEM space. Learn the fundamentals by deploying a cheap, yet capable, lab
Read More
Staff
How to run data breach simulations
ai cybersecurity

How to run data breach simulations

Need to run a data breach simulation? Learn how to organise and execute them quickly and efficiently
Read More
Staff
Running rapid risk assessments using Google Gemini and Confluence
ai cybersecurity

Running rapid risk assessments using Google Gemini and Confluence

Need to run a risk assessment for a project or tool? Learn how Gemini and Confluence can help you do it faster
Read More
Staff
Build a free ISMS: how to create a great landing page
free isms

Build a free ISMS: how to create a great landing page

A landing page is a key part of your ISMS. Learn how to create the perfect one to help your colleagues and auditors
Read More
Staff
Confluence pentest reporting: simple KPIs to track remediation performance
cybersecurity metrics

Confluence pentest reporting: simple KPIs to track remediation performance

Need to track the remediation of pentest findings? Use confluence reporting tools to stay on top of the game
Read More
Staff
Building an awesome security wiki: tips and tricks for busy teams
cybersecurity bootstrapping

Building an awesome security wiki: tips and tricks for busy teams

Are you leading a security team and have a documentation problem? Learn how to fix it today and save your future self
Read More
Staff
Help I'm a new CISO! Tips to make a great impression on probation
ciso skills

Help I'm a new CISO! Tips to make a great impression on probation

Have you managed to land your first CISO role? Great, now you need to quickly impress! Find out exactly how it's done
Read More
Staff
How to build a free ISMS with ChatGPT
free isms

How to build a free ISMS with ChatGPT

ChatGPT can accelerate the creation of a free Information Security Management System. Find out how in this post
Read More
Staff
Blog on Security © 2025
  • Subscribe
  • Privacy policy
  • Edoardo Gerosa
Powered by Ghost