Below you will find reports with the tag of “Security Incident” A Framework For Exploring Cybersecurity Policy Options The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other. (more available) Added: October 23, 2018 Achieving Cyber Resilience This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware. Added: October 23, 2018 Anatomy Of A Cyber Extortion Operation In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations. (more available) Added: October 23, 2018 Annual Ransomware Report 2017 Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks. (more available) Added: October 23, 2018 BDO 2017 Cyber Governance Survey This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management. (more available) Added: October 23, 2018 Beyond the Bottom Line: The Real Cost of Data Breaches This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne. Added: October 23, 2018 Breaking Down The Complexity Of Retail Security This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets. (more available) Added: October 23, 2018 Consumer Account Security Report 2016 The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016. (more available) Added: October 23, 2018 Cyber Threatscape Report 2018 This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware. (more available) Added: October 23, 2018 Cybersecurity Preparedness and Response This is a report based on a collaborative survey. Taken as a whole, there continues to be low hanging vulnerabilities which are not addressed in the middle market space. This survey is meant to highlight some of these vulnerabilities and provide risk professionals with a tool to help mitigate both privacy and security risk. (more available) Added: October 23, 2018 Enterprise Mobile: The New Threat Vector This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age. Added: October 23, 2018 Examining The Costs and Causes of Cyber Incidents Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible. (more available) Added: October 23, 2018 GDPR Advisory #1: Protecting The Pathways To Personal Information The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data. (more available) Added: October 23, 2018 GTIC Monthly Threat Report September 2017 This monthly threat report takes a look at the month of September 2017. More specifically, it takes a look at VULNS, Apache Exploits, and the Equifax breach. (more available) Added: October 23, 2018 Ironclad API's:An Approach For Application Security Testing This paper discusses some API’s and how you can protect them from an attack. Added: October 23, 2018 Is Data The New Endpoint This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured. (more available) Added: October 23, 2018 Key Findings from The Global State of Information Security Survey 2017 This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability. (more available) Added: October 23, 2018 Next-Gen Endpoint Risks And Protections: A SANS Survey This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection. (more available) Added: October 23, 2018 PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more. (more available) Added: October 23, 2018 Prepare For Battle:Building An Incident Response Plan This report provides a walkthrough of creating an Incident Response Plan. Added: October 23, 2018 Quarterly Report Q4 2017 This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world. Added: October 23, 2018 «« « 63 64 65 66 67 » »»
A Framework For Exploring Cybersecurity Policy Options The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other. (more available) Added: October 23, 2018
Achieving Cyber Resilience This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware. Added: October 23, 2018
Anatomy Of A Cyber Extortion Operation In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations. (more available) Added: October 23, 2018
Annual Ransomware Report 2017 Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks. (more available) Added: October 23, 2018
BDO 2017 Cyber Governance Survey This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management. (more available) Added: October 23, 2018
Beyond the Bottom Line: The Real Cost of Data Breaches This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne. Added: October 23, 2018
Breaking Down The Complexity Of Retail Security This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets. (more available) Added: October 23, 2018
Consumer Account Security Report 2016 The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016. (more available) Added: October 23, 2018
Cyber Threatscape Report 2018 This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware. (more available) Added: October 23, 2018
Cybersecurity Preparedness and Response This is a report based on a collaborative survey. Taken as a whole, there continues to be low hanging vulnerabilities which are not addressed in the middle market space. This survey is meant to highlight some of these vulnerabilities and provide risk professionals with a tool to help mitigate both privacy and security risk. (more available) Added: October 23, 2018
Enterprise Mobile: The New Threat Vector This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age. Added: October 23, 2018
Examining The Costs and Causes of Cyber Incidents Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible. (more available) Added: October 23, 2018
GDPR Advisory #1: Protecting The Pathways To Personal Information The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data. (more available) Added: October 23, 2018
GTIC Monthly Threat Report September 2017 This monthly threat report takes a look at the month of September 2017. More specifically, it takes a look at VULNS, Apache Exploits, and the Equifax breach. (more available) Added: October 23, 2018
Ironclad API's:An Approach For Application Security Testing This paper discusses some API’s and how you can protect them from an attack. Added: October 23, 2018
Is Data The New Endpoint This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured. (more available) Added: October 23, 2018
Key Findings from The Global State of Information Security Survey 2017 This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability. (more available) Added: October 23, 2018
Next-Gen Endpoint Risks And Protections: A SANS Survey This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection. (more available) Added: October 23, 2018
PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more. (more available) Added: October 23, 2018
Prepare For Battle:Building An Incident Response Plan This report provides a walkthrough of creating an Incident Response Plan. Added: October 23, 2018
Quarterly Report Q4 2017 This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world. Added: October 23, 2018