The Way of the Cyber Warrior: Tactical Cyber Defense
-
Updated
Apr 26, 2022 - Jupyter Notebook
The Way of the Cyber Warrior: Tactical Cyber Defense
Simple CLI script to assist GRC analysts with risk ranking vendors.
Executive-focused cybersecurity threat intelligence. Business impact analysis of current threats. C-suite language, not geek speak. Updated daily.
Repository containing the final essay of the Ethics and Law of Data and AI course, valid for the accademic year 2024-2025 at UniTs.
Cybersecurity risk intelligence dashboard analyzing CVE vulnerabilities, CVSS risk scores, and financial exposure using Power BI.
Real-time distributed cyber-threat observatory monitoring ransomware attacks on global critical infrastructure. Features automated dark-web ingestion, Citizen Impact Scoring (CIS), and national risk heatmaps. Built with Next.js 15, Prisma, and Playwright
OSINT-based threat intelligence assessment analyzing phishing, brand impersonation, and identity-centric risks affecting an IAM provider.
Enterprise identity and access risk analysis project identifying privileged access exposure, segregation of duties violations, and orphaned high-risk accounts using SQL and Excel
Cybersecurity vulnerability assessment and risk analysis of a Linux MySQL database server using NIST SP 800-30, NIST CSF, and CIA Triad principles. Includes risk scoring, control recommendations, and remediation planning.
Modello personalizzabile per la valutazione e la gestione del cyber-rischio dell'utente domestico
Repository for Cybrary Security Engineering & Cyber Risk – includes notes, docs, scenarios, extras, and certificate of completion.
Add a description, image, and links to the cyber-risk topic page so that developers can more easily learn about it.
To associate your repository with the cyber-risk topic, visit your repo's landing page and select "manage topics."