Category: Reports

Thales data threat report 2017

A fundamental challenge in cybersecurity is dealing with the speed of change and the highly dynamic nature of the IT world. With each new computing paradigm – cloud, Big Data, IoT, etc. – comes new capabilities and possibilities, along with …

Global Cybersecurity Index (GCI) 2017

The Global Cybersecurity Index (GCI) is a survey that measures the commitment of Member States to cybersecurity in order to raise awareness. The GCI revolves around the ITU Global Cybersecurity Agenda (GCA) and its five pillars (legal, technical, organizational, capacity …

The guidelines on cyber security onboards ship

  Ships are increasingly using systems that rely on digitisation, integration, and automation, which calls for cyber risk management on board. As technology continues to develop, information technology (IT) and operational technology (OT) onboard ships are being networked together – …

Internet Security Report – Q1 2017

WatchGuard’s Threat Lab (previously the LiveSecurity Threat Team) is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network. The Threat Lab …

Cyber Europe 2016: After Action Report

Cyber Europe 2016 was the fourth pan-European cyber crisis exercise organised by the European Union Agency for Network and Information Security (ENISA). Over 1 000 participants working mostly in the ICT sector, from public and private organisations from all 28 …

ICS cybersecurity: A view from the field

Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in targeted attacks, such as BlackEnergy or Operation Ghoul, aimed at the industrial sector, but also …

Internet Security Threat Report

Cyber attackers revealed new levels of ambition in 2016, a year marked by extraordinary attacks, including multi-million dollar virtual bank heists, overt attempts to disrupt the US electoral process by state-sponsored groups, and some of the biggest distributed denial of …

2017 Data Breach Investigations Report

“These findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise … not attacks, not impact, not general security incidents and not risk.” The study has since evolved to include security incidents and not just breaches …

Cyber Warfare

The Information Age is fast becoming the age of the zero-day vulnerability, the kind of holes in software that allow attackers get in to steal, destroy, or manipulate data. As a measure of global Internet security, the number of zero …