The CISO's New Dawn
This report looks at the roles and responsibility CISO’s have, highlighting changes over the past 12-18 months.
Analysis Of Brexit Centric Twitter
This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 million tweets that matched the word “brexit” published by 1. (more available)
Demystifying Vulnerabilitiy Management
This report takes a close look at vulnerability management and seeks to make it a far simpler task.
DeepGaurd: Proactive On-host Protection Against New And Emerging Threats
This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and provides an overview of the technology and methodology used by DeepGuard, the Host-based Intrusion Prevention System (HIPS) of F-Secure’s security products. (more available)
Evaluating The Customer Journey Of Crypto-Ransomware And The Paradox Behind It
From the report, “We found the paradox of illicit, malicious activity juxtaposed with helpful customer service so interesting that we decided to evaluate the customer journeys of fi ve current ransomware families. (more available)
This White Paper is a report regarding The Callisto Group. The Callisto Group is an advanced threat actor whose known targets include military personnel, government officials, think tanks, and journalists in Europe and the South Caucasus. (more available)
2015 Threat Report
The report introduces the Chain of Compromise as an analytical concept to help readers, particularly those working in cyber security and information technology roles, understand how attackers compromise security using different combinations of tactics and resources. (more available)
FSecure 2017 State Of Cyber Security
This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.
Ransomware:How To Predict, Prevent, Detect And Respond
This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure. (more available)