Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Intel Sharing

Below you will find reports with the tag of “Intel Sharing”

image from Several Polish banks hacked, information stolen by unknown attackers

Several Polish banks hacked, information stolen by unknown attackers

Multiple Polish banks have fallen victim to malware. This post contains what information was public about the attack at the time.

(more available)
Added: November 12, 2018
image from The Internet Is Broken

The Internet Is Broken

With the subtitle “Why Internet Routing Sucks” you know this will be an interesting read.

Added: October 24, 2018
image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported.

(more available)
Added: October 21, 2018
image from US-Japan Alliance Conference: Strengthening Strategic Cooperation

US-Japan Alliance Conference: Strengthening Strategic Cooperation

In 2015, after two years of study and policy coordination, the United States and Japan publicly issued new defense guidelines, updating and expanding upon the previous guidance of 1997. The new guidelines enable a much broader set of cooperative engagements, including in geographic areas beyond the areas surrounding Japan and in the new domains of outer space and cyberspace.

(more available)
Added: October 21, 2018
image from The 2018 Hacker Report

The 2018 Hacker Report

This report is a kind of dossier on the hacker community. It lets you in to their world, to know their mindset, and thoughts on the bug bounty community.

(more available)
Added: October 20, 2018
image from The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

The Future Of Political Warfare: Russia, The West, And The Coming Age Of Digital Competition

This paper outlines the current state of play in political warfare, identifies emerging threats, and proposes potential policy responses. It argues for greater information sharing mechanisms between trans-Atlantic governments and the private sector, greater information security and transparency, and greater investments in research and development on AI and computational propaganda. As authoritarian regimes seek to undermine democratic institutions, Western societies must harness their current— though fleeting—competitive advantage in technology to prepare for the next great leap forward in political warfare.

(more available)
Added: October 20, 2018
image from Thought Leadership 2016 Programme: Key Findings

Thought Leadership 2016 Programme: Key Findings

The 2016 Thought Leadership programme convened by Corsham Institute, in conjunction with RAND Europe and St George’s House, examined a number of crucial dimensions of our connected society. The programme facilitated the gathering of a diverse set of experts and influential leaders from various sectors to discuss challenges and opportunities, share experiences, and build a network. To give a brief glimpse of these discussions, we have produced this Key Findings report to provide participants, stakeholders and interested parties with a strong sense of both the subjects covered during our deliberations, as well as some of the issues, which still need to be tackled going forward.

(more available)
Added: October 20, 2018
image from Flipping the Economics of Attacks

Flipping the Economics of Attacks

How much does it cost technically proficient adversaries to conduct successful attacks, and how much do they earn? In this report, they look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

(more available)
Added: October 18, 2018
image from The Internet Of Things Isn't Coming, It's Here

The Internet Of Things Isn't Coming, It's Here

This report discusses the results of a survey conducted in 2016 that asked respondents what makes something a “thing” instead of a “computer.”

(more available)
Added: October 18, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from Voice Of The Analyst: An Inside Perspective On Security Operations

Voice Of The Analyst: An Inside Perspective On Security Operations

This report offers the results of a survey that sought to understand the true nature and quality of a SECOP position.

(more available)
Added: October 16, 2018
image from Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

Developing Cybersecurity Capacity: A Proof-Of-Concept Implementation Guide

This project comprised two main research and development phases. The first phase of the project entailed a requirements analysis and architecture-design effort. For further details on this phase, please refer to the first study report. The second phase of the project entailed the development of a proof-of-concept toolbox. This report presents the proof-of-concept toolbox.

(more available)
Added: October 15, 2018
image from Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

This report documents research conducted as part of the project “Building a Strategy for Cyber Support to Corps and Below.” RAND Arroyo Center was asked by U.S. Army Cyber Command’s G35 office to develop and document an Army strategy for providing cyber sup- port to corps and below (CSCB) units that describes how the Army should use its available resources to achieve mission objectives.

(more available)
Added: October 15, 2018
image from The Explosion Of Apps: 27% Are Risky

The Explosion Of Apps: 27% Are Risky

This report seeks to outline the potential problems related to apps that are allowed to have access to corporate networks and servers.

(more available)
Added: October 14, 2018
image from The Main Pillars Of The DevOps Toolchain

The Main Pillars Of The DevOps Toolchain

This paper discusses DevOps and the security issues related to DevOps.

Added: October 14, 2018
image from The Rise of Nation State Attacks

The Rise of Nation State Attacks

The Rise of Nation State Attacks, sponsored by CounterTack | MCSI and conducted by Ponemon Institute, reveals organizations’ lack of readiness to respond to nation state attacks due to an uncertainty as to what a nation state attack is and how to identify the key characteristics, methods and motives of these attacks that originate with foreign governments.

(more available)
Added: October 14, 2018
image from Cyber Security Economic Issues

Cyber Security Economic Issues

The emerging field of cybersecurity economics could benefit from better data, better under- standing, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity invest- ment decisions. In particular, it suggests that companies, the government, and other organizations can help improve our under- standing of cybersecurity economics by moni- toring cybersecurity incidents and responses, soliciting and using standard terminology and measures, and sharing data whenever possible.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 20:08 UTC (build b1d7be4)