Below you will find reports with the tag of “Intellectual Property” Retaining The Army's Cyber Expertise In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. Specifically, they apply 17C enlist- ment requirements to all soldiers to determine how many meet the standards. They also use data on civilian occupa- tions to determine the earnings these soldiers are likely to be offered based on their military cyber training. To do this, they use the American Community Survey (ACS) data on all workers in information technology (IT)–related occupations. (more available) Added: October 25, 2018 CISO Insights: 7 Best Practices For A Successful Insider Threat Program In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program. (more available) Added: October 24, 2018 Database Discovery: Identifying Hidden Risks and Sensitive Data Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems. (more available) Added: October 24, 2018 7 Best Practices For Cybersecurity This is a helpful little report that simplifies the best practices for Cybersecurity. Added: October 22, 2018 Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018 Boards Turn To The Talent Agenda This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents. (more available) Added: October 21, 2018 Health Warning: Cyberattacks Are Targeting The Healthcare Industry This research report is about theft in the healthcare industry. Specifically, it describes the marketplace for stolen healthcare industry data and examines the motivations for its theft. (more available) Added: October 21, 2018 Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users (more available) Added: October 21, 2018 Tech Report:Targeted Attacks On Defense Industry This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry. Added: October 21, 2018 The Rising Strategic Risks of Cyberattacks Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation. (more available) Added: October 21, 2018 The Value Of Data This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place. (more available) Added: October 21, 2018 Virtualization Makes CIOs Role Key An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming? (more available) Added: October 21, 2018 Beneath the surface of a cyberattack In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, Deloitte has leveraged their experience with a variety of cyber incidents and their deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack. (more available) Added: October 20, 2018 A 360-Degree Guide To Choosing And Migrating To A New Email Client This white paper seeks to offer some insight into migrating to a new email client. Added: October 19, 2018 Cyber Threats to the Nordic Region This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region. (more available) Added: October 19, 2018 World Economic Situations And Prospects: Update as of mid-2018 The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017. (more available) Added: October 19, 2018 2017 Open Source Security & Risk Analysis This report includes insights and recommendations intended to help organi- zations and their security, risk, legal, and development teams better understand the open source security and license risk landscape as they strive to improve their application risk management processes. (more available) Added: October 18, 2018 3 Steps To Mitigating Insider Threat Without Slowing Down Users The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users. (more available) Added: October 18, 2018 Espionage As A Service This brief takes a look at the espionage as a service industry and how it can help businesses become secure. (more available) Added: October 18, 2018 Generations of Machine Learning In Cybersecurity In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time. (more available) Added: October 18, 2018 Getting To Yes With China In Cyberspace This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. It looks at two basic questions: Can the United States and China return to meaningful formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement, and what might be exchanged for what? (more available) Added: October 18, 2018 «« « 1 2 3 4 5 » »»
Retaining The Army's Cyber Expertise In this report, they focus on issues related to retaining cyber soldiers. They use data from the Army’s personnel files to determine how many new soldiers are likely to meet the qualifications for this new MOS, as well as their expected retention rates. Specifically, they apply 17C enlist- ment requirements to all soldiers to determine how many meet the standards. They also use data on civilian occupa- tions to determine the earnings these soldiers are likely to be offered based on their military cyber training. To do this, they use the American Community Survey (ACS) data on all workers in information technology (IT)–related occupations. (more available) Added: October 25, 2018
CISO Insights: 7 Best Practices For A Successful Insider Threat Program In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program. (more available) Added: October 24, 2018
Database Discovery: Identifying Hidden Risks and Sensitive Data Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems. (more available) Added: October 24, 2018
7 Best Practices For Cybersecurity This is a helpful little report that simplifies the best practices for Cybersecurity. Added: October 22, 2018
Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018
Boards Turn To The Talent Agenda This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents. (more available) Added: October 21, 2018
Health Warning: Cyberattacks Are Targeting The Healthcare Industry This research report is about theft in the healthcare industry. Specifically, it describes the marketplace for stolen healthcare industry data and examines the motivations for its theft. (more available) Added: October 21, 2018
Increasing Identity Security Without Increasing User Disruptions: A Case For Adaptive Authentication Read this paper to understand: How attackers compromise organizations, How you can more quickly detect attackers, How you can increase security without disrupting users (more available) Added: October 21, 2018
Tech Report:Targeted Attacks On Defense Industry This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry. Added: October 21, 2018
The Rising Strategic Risks of Cyberattacks Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation. (more available) Added: October 21, 2018
The Value Of Data This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place. (more available) Added: October 21, 2018
Virtualization Makes CIOs Role Key An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming? (more available) Added: October 21, 2018
Beneath the surface of a cyberattack In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, Deloitte has leveraged their experience with a variety of cyber incidents and their deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack. (more available) Added: October 20, 2018
A 360-Degree Guide To Choosing And Migrating To A New Email Client This white paper seeks to offer some insight into migrating to a new email client. Added: October 19, 2018
Cyber Threats to the Nordic Region This report details some of cyber threat activity that has been observed against Denmark, Finland, Iceland, Norway, and Sweden. It explores motivations of the cyber threat and factors that could trigger future activity in the region. (more available) Added: October 19, 2018
World Economic Situations And Prospects: Update as of mid-2018 The present document updates World Economic Situation and Prospects 2018 (United Nations publication, Sales No. E.18.II.C.2), released in December 2017. (more available) Added: October 19, 2018
2017 Open Source Security & Risk Analysis This report includes insights and recommendations intended to help organi- zations and their security, risk, legal, and development teams better understand the open source security and license risk landscape as they strive to improve their application risk management processes. (more available) Added: October 18, 2018
3 Steps To Mitigating Insider Threat Without Slowing Down Users The point of this white paper is to teach folks how to leverage endpoint security to spot risk and free their users. (more available) Added: October 18, 2018
Espionage As A Service This brief takes a look at the espionage as a service industry and how it can help businesses become secure. (more available) Added: October 18, 2018
Generations of Machine Learning In Cybersecurity In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time. (more available) Added: October 18, 2018
Getting To Yes With China In Cyberspace This report is a response to the absence of a formal dialogue and explores U.S. policy options for managing relations with China over this critical policy area. It looks at two basic questions: Can the United States and China return to meaningful formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement, and what might be exchanged for what? (more available) Added: October 18, 2018