2015 Strategic Security Survey
In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. (more available)
Cyber Benefits and Risks: Quantitatively Forecasting and Understanding the Balance
What is the balance of economic benefits and costs conferred upon societies by cyber technologies, also designated here as information and communication technologies (ICT)? (more available)
DDoS Threat Report Q1 2016
This report takes a look at the DDoS threats that occurred in the first quarter of 2016.
Suspected Chinese Syber Espionage Group TEMP.Periscope Targeting U.S. Engineering and Maritime Industries
This blog post takes a look at a specific Chinese threat that is impacting Engineering and Maritime corporations.
Cyber Threats To The Energy Industry
Learn what situations contribute to threat activities towards organizations in the energy industry.
Threat Intelligence Executive Report 2017: Volume 5
This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the use of social platforms to target victims, espionage that targets law firms, weakness in business processes, and phishing. (more available)
The Cost of Cyber Crime
This research develops a causal model, relating different cyber crime types to their impact on the UK economy. The model provides a simple framework to assess each type of cyber crime for its various impacts on citizens, businesses and the Government. (more available)