Knowledge Center

Cyber Reading References

Curated cybersecurity reading links, research writeups, frameworks, and external references to help security teams follow useful guidance without wasting time searching.
CURATED READING LIST

Useful Cybersecurity References

Explore selected external guidance, research writeups, frameworks, and technical references for security teams, analysts, and learners.

External Sources Security Guidance Research Links
OWASP application security reference
Application Security owasp.org

OWASP Application Security References

Practical application security references for understanding common web, API, and software security risks.

This reference is useful for developers, security engineers, and AppSec teams who need structured guidance on secure design, testing priorities, and common attack patterns.

Visit Website →
MITRE ATT&CK cyber threat reference
Threat Intelligence attack.mitre.org

MITRE ATT&CK Adversary Tactics and Techniques

A structured knowledge base for understanding adversary behavior, tactics, techniques, and detection mapping.

This reference helps security teams map attacker behavior to real-world techniques and build stronger detection, threat hunting, and incident response workflows.

Visit Website →
CISA cybersecurity guidance reference
Cyber Defense cisa.gov

CISA Cybersecurity Guidance and Alerts

Government-backed cybersecurity guidance, alerts, advisories, and defense recommendations for organizations.

This source is useful for tracking official advisories, defensive guidance, vulnerability notices, and practical recommendations for improving organizational security posture.

Visit Website →
Cloud security reading reference
Cloud Security cloud.google.com

Cloud Security Architecture and Best Practices

Security references for cloud identity, network controls, logging, monitoring, and secure architecture patterns.

This reading reference is useful for cloud security engineers, infrastructure teams, and architects who need practical guidance for securing cloud workloads and services.

Visit Website →
Incident response reference
Incident Response sans.org

Incident Response Planning and Readiness

Reading material for preparing incident response plans, escalation workflows, and post-incident review practices.

This reference helps teams understand how to prepare response plans, define responsibilities, collect evidence, communicate during incidents, and improve after lessons learned.

Visit Website →
Security operations reference
Security Operations elastic.co

Security Monitoring and Detection Engineering

References for building detection logic, monitoring use cases, alert quality, and SOC operational maturity.

This reference is useful for SOC analysts, detection engineers, and security operations teams working on alert tuning, coverage mapping, and response workflows.

Visit Website →
Risk management reference
Governance & Risk nist.gov

Cybersecurity Risk Management References

Practical reading for understanding cybersecurity risk, control maturity, governance, and compliance alignment.

This reference supports security leaders, GRC teams, and auditors who need to connect technical security findings with business risk and control improvement.

Visit Website →
Vulnerability management reference
Vulnerability Management cisa.gov

Vulnerability Management and Prioritization

References for vulnerability assessment, prioritization, remediation tracking, and exposure reduction.

This source is useful for teams managing scan results, patching decisions, exploitability context, and remediation ownership across infrastructure and applications.

Visit Website →
Ransomware reading reference
Ransomware cisa.gov

Ransomware Trends and Defensive Guidance

Curated reading on ransomware behavior, common intrusion paths, impact, and defensive preparation.

This reference helps readers understand ransomware campaigns, attacker objectives, business impact, backup readiness, and security controls that reduce exposure.

Visit Website →
Data breach reading reference
Data Breaches haveibeenpwned.com

Data Breach Analysis and Exposure Awareness

References for understanding exposed data risks, credential compromise, and breach awareness.

This reading reference supports security awareness, risk analysis, and executive understanding of how credential exposure and data breaches impact organizations.

Visit Website →

Get started today!

To know more and to setup an experiential demo 

Top
oh hello you
Award-winning
creative agency.
Delivering high-quality projects for international clients. Ask us about digital, branding and storytelling.

GENERAL INQUIRIES
borgholm@qodeinteractive.com

SOCIAL MEDIA

Contact Us

Fill in your details and we’ll get back within 24 hours.

    Privacy Policy

    This Privacy Policy applies to the www.castellumlabs.com

    Castellum Labs recognises the importance of maintaining your privacy. We value your privacy and appreciate your trust in us. This Policy describes how we treat user information we collect on https://staging.castellumlabs.com and other offline sources. This Privacy Policy applies to current and former visitors to our website. By visiting and/or using our website, you agree to this Privacy Policy. Castellum Labs is a business unit of Raaga Technologies Private Limited and focuses on information technology and cyber security services and products.

    Castellumlabs.com is brand and is a property of Raaga Technologies Private Limited, an Indian Company registered under the Companies Act, 2013 having its registered office at Workyard, 337, Phase 2, Industrial Area, Phase 1, Chandigarh, India - 160002.

    Information we collect

    Contact information. We might collect your name, email, mobile number, phone number, employer company, your designation, street, city, state, pin-code, country and IP address.

    Payment and billing information. We do not conduct any online transaction and do not ask our website users for any kind of financial or payment information on our website.

    Information you post. We collect information you post in a public space on our website or on a third-party social media site or asset or page or account or wall belonging to Castellum Labs.

    Demographic information. We may collect demographic information about you or any other information provided by your during the use of our website with your consent and your approval. We might collect this as a part of a survey also.

    We collect information in different ways.

    We collect information directly from you. We collect information directly from you when you fill a query form or else when you drop a message to our number of else when you call our phone numbers. We also collect information if you post a comment on our websites or ask us a question through phone or email.

    We collect information from you passively. We may use tracking tools like Google Analytics, Google Webmaster, browser cookies and web beacons for collecting information about your usage of our website and any associate web sites of ours.

    We get information about you from third parties. For example, if you use an integrated social media feature on our websites. The third-party social media site will give us certain information about you. This could include your name and email address.

    Use of your personal information

    We use information to contact you: We might use the information you provide to contact you for confirmation of the answers for your queries posted on our website.

    We use information to respond to your requests or questions. We might use your information to confirm your registration for a webinar or an event or a course published by us.

    We use information to improve our products and services. We might use your information to customize your experience with us. This could include displaying content based upon your preferences.

    We use information to look at site trends and customer interests. We may use your information to make our website and products better. We may combine information we get from you with information about you we get from third parties.

    We use information for security purposes. We may use information to protect our company, our customers, our websites or our other digital assets on internet.

    We use information for marketing purposes. We might send you information about special promotions or offers. We might also tell you about new services, features, products, reports or other offerings. These might be our own offers or products, or third-party offers or products we think you might find interesting. Or, for example, if you submit a query, we might enroll you for our newsletter with your consent.

    We use information to send you transactional communications. We might send you emails or SMS about your account, registration or a query submitted by you.

    We use information as otherwise permitted by law.

    Sharing of information with third-parties

    We might share information with third parties who perform services on our behalf. We share information with vendors who help us manage our online registration process or query processors or transactional message processors. Some vendors may be located outside of India.

    We will share information with our business partners. This includes a third party who provide or sponsor an event, or who operates a venue where we hold events. Our partners use the information we give them as described in their privacy policies.

    We may share information if we think we have to in order to comply with the law or to protect ourselves. We will share information to respond to a court order or subpoena. We may also share it if a government agency or investigatory body requests. Or, we might also share information when we are investigating potential fraud.

    We may share information with any successor to all or part of our business. For example, if part of our business is sold we may give our customer list as part of that transaction.

    We may share your information for reasons not described in this policy. We will tell you before we do this.

    Email Opt-Out

    You can opt out of receiving our marketing emails. To stop receiving our promotional emails, please email unsubscriber@castellumlabs.com. It may take about ten days to process your request. Even if you opt out of getting marketing messages, we will still be sending you transactional messages through email and SMS about your queries.

    Third party sites

    If you click on one of the links to third party websites, you may be taken to websites we do not control. This policy does not apply to the privacy practices of those websites. Read the privacy policy of other websites carefully. We are not responsible for these third-party sites.

    Grievance Officer

    In accordance with Information Technology Act 2000 and rules made there under, the name and contact details of the Grievance Officer are provided below:

    Mrs. Rinky (Sukriti) Shukla

    Workyard, 337, Phase 2,
    Industrial Area, Phase 1,
    Chandigarh, India - 160002

    Phone: +91 - 86399 53505
    Email: sukriti.shukla@castellumlabs.com

    If you have any questions about this Policy or other privacy concerns, you can also email us at privacy@castellumlabs.com

    Updates to this policy

    This Privacy Policy was last updated on 20.12.2025. From time to time we may change our privacy practices. We will notify you of any material changes to this policy as required by law. We will also post an updated copy on our website. Please check our site periodically for updates.

    Jurisdiction

    If you choose to visit the website, your visit and any dispute over privacy is subject to this Policy and the website's terms of use. In addition to the foregoing, any disputes arising under this Policy shall be governed by the laws of India.

    Annual Summary Report

    Please provide your details to access the report.