Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Intel sharing

Below you will find reports with the tag of “Intel sharing”

image from Global Cybersecurity Index & Cyberwellness Profiles

Global Cybersecurity Index & Cyberwellness Profiles

The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles. (more available)
Added: August 3, 2020
image from Global Cybersecurity Index 2017

Global Cybersecurity Index 2017

A survey driven review of 25 indicators via 157 questions spanning 193 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis. (more available)
Added: August 1, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis. (more available)
Added: August 1, 2020
image from The 2019 Hacker Report

The 2019 Hacker Report

The third annual report from Hacker One on the state of the hacker/security testing community. Data is drawn from Hacker One’s community of bug bounty registrants and subscribing platforms. (more available)
Added: June 23, 2020
image from 2020 SANS Cyber Threat Intelligence (CTI) Survey

2020 SANS Cyber Threat Intelligence (CTI) Survey

A lot of progress has been made in the past few years around requirements. Next steps in this area include identifying when and why to update intelligence requirements—even ad hoc adjustments can be planned for by identifying the circumstances under which they would need to be changed. (more available)
Added: May 11, 2020
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. (more available)
Added: May 18, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. (more available)
Added: March 26, 2019
image from The New Combative Role of a Cyber Security Incident Response Program

The New Combative Role of a Cyber Security Incident Response Program

This report offers insights into why a CSIRT is crucial in today’s world. It provides some helpful tips and steps that can improve any organization’s response team. (more available)
Added: March 6, 2019
image from The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

Ponemon Institute is pleased to present The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies, sponsored by Anomali. (more available)
Added: March 1, 2019
image from Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

This report offers insights and guides into the new Help America Vote Act.
Added: February 12, 2019
image from Reducing Phishing Risk In The SOC

Reducing Phishing Risk In The SOC

This whitepaper is intended to help firms understand how security automation can accelerate analyst response time to incoming phishing alerts and minimize the impact of these malicious attacks on their environment. (more available)
Added: February 12, 2019
image from Report On Improving Cybersecurity In The Health Care Industry

Report On Improving Cybersecurity In The Health Care Industry

This report provides information cultivated by the Task Force, which offers the opportunity to address significant cybersecurity concerns in the health care industry. (more available)
Added: November 24, 2018
image from Several Polish banks hacked, information stolen by unknown attackers

Several Polish banks hacked, information stolen by unknown attackers

Multiple Polish banks have fallen victim to malware. This post contains what information was public about the attack at the time. (more available)
Added: November 12, 2018
image from The Internet Is Broken

The Internet Is Broken

With the subtitle “Why Internet Routing Sucks” you know this will be an interesting read.
Added: October 24, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other. (more available)
Added: October 23, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. (more available)
Added: October 22, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported. (more available)
Added: October 21, 2018
image from US-Japan Alliance Conference: Strengthening Strategic Cooperation

US-Japan Alliance Conference: Strengthening Strategic Cooperation

In 2015, after two years of study and policy coordination, the United States and Japan publicly issued new defense guidelines, updating and expanding upon the previous guidance of 1997. (more available)
Added: October 21, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community. (more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. (more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. (more available)
Added: October 20, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 26, 2021 00:08 UTC (build 7e736b2)