Cybersecurity In Financial Services
This Paper provides a breakdown of New York’s 23 NYCRR500 Financial Security requirements.
Evaluation Guide For Mobile App Security Testing
This book provides some good guidance for app security testing. It seeks to assist enterprises with solving the issues surrounding app security. (more available)
The State of Bug Bounty 2016
This is an annual report that provides an inside look into the economics and emerging trends of bug bounties, with data collected from Bugcrowd’s platform and other sources throughout 2016. (more available)
Using Network Analytics To Detect PowerShell Attacks
This report provides an analysis of Microsoft’s PowerShell language and how it has been used by cybercriminals.
The Cloud Threat Funnel: Suspicious User Behavior That Matters
For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. (more available)
2016 State of Application Survey:Skills, Configurations, and Components
From the report, “Application security (AppSec) is maturing for most organizations, according to the 475 respondents who took the SANS 2016 State of Application Security survey. (more available)
Cyber Power Potential Of The Army's Reserve Component
This report documents research conducted as part of a study entitled “Managing and Developing Reserve Component Capabilities in Sup- port of the Army’s Cyber Force. (more available)
The Four Pillars Of Modern Vulnerability Management
This report breaks down four strategic pillars of handling vulnerability management.