Category: Reports

Trustwave global security report 2016

Cybercrime is big business. We hear it so often that the words threaten to lose their impact. But the details still have the capacity to shock. In last year’s report, we demonstrated how attackers launching a malware infection campaign could …

The Cyber Research Databank

The purpose of web application security testing is to find any security weaknesses or vulnerabilities within an application and its environment, to document the vulnerabilities, and to explain how to fix or remediate them. The business drivers behind the testing …

2017 Security Predictions

Conventional thinking divides the digital and physical worlds into two distinct and separate realms. But is that still true? In preparing this report, the persistent and compelling theme that kept surfacing as we identified our security predictions for 2017 was …

Mastering The Migration

A Candid Survey of Federal Leaders on the State of Cloud Computing In February 2011, White House Chief Information Officer Vivek Kundra authored an ambitious federal policy aimed at elevating cloud computing investments to critical urgency across the federal government. …

2017 Tag Cyber security annual volume 3

Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Suchexperts and practitioners must therefore relyon their experience, expertise, and knowledge with respect to interpretation and …

Cyberwar and the future of cybersecurity

Cybercriminals are as varied as other internet users: just as the web has allowed businesses to sell and communicate globally, so it has given fraudsters the ability to plunder victims anywhere and set up crime networks that, previously, would have …

2017 Tag Cyber Security Annual Volume 2

The interviews contained in this volume were written in the summer of 2016, mostly based on discussions between the interviewee and myself – often in person. They are designed to recreate the stimulating discussions. I enjoyed during the research associated …

2016 DDoS Attack Trends

Remember Huey Lewis and the News? The blues-rock band sounded retro even when they appeared on the scene with their hit, “Hip to Be Square” in 1983. But you know what? It’s nearly 40 years later, and the airwaves are …

Cybersecurity primer for banking and finance

The wise advice of Warren Buffet couldn’t be more relevant than in contemplating the effects of cyber-attacks on financial institutions. As stated in a recent issue of the Federal Deposit Insurance Corporation’s Supervisory Insights, the risks presented by cyber attacks …