OSINT-y Goodness, №15 — CSIAC

This is how the site is divided up. Under each major heading lies much more information!
Lots of free resources!
There are more recent webinars, but I liked the content of this one as an example.
Just one of the many items from the Featured Content section.
Journal of Cyber Security and Information Systems
Connect with people!
  • Cybersecurity
  • Modeling & Simulation
  • Software Intensive Systems Engineering
  • Knowledge Management & Information Sharing
  • Cyber COI (Department of Defense Community of Interest)
Listen up! CSIAC has podcasts!

--

--

--

#Librarian turned #InformationSecurity professional. Your guide up a mountain of information!

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

VirtualU Personal Reputation Management Do It Yourself Kit

Is MSPs AI Email and Electronic Communications surveillance CCOs, RIAs & CTOs answer to SEC and…

Age of Privacy

Breaking TLS encryption using Raccoon Attack

{UPDATE} 糖果缤纷乐-果冻消消乐游戏 Hack Free Resources Generator

Cobalt Strike Payload Discovery And Data Manipulation In VQL

What Would You Do If There Was a Cyber Attack on the US?

Guide on how to use SWallet

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
InfoSecSherpa

InfoSecSherpa

#Librarian turned #InformationSecurity professional. Your guide up a mountain of information!

More from Medium

InfoSecSherpa’s News Roundup for Tuesday, May 10, 2022

Sawtooth Mountains in Idaho. See #9 for Idaho cybersecurity news item.

YourCyanide, a new and sophisticated ransomware variant that integrates documents into PasteBin…

Pentesting toolkit: all you need to know

So, what is a cybersecurity incident?