Category: Reports
The digital space is highly contested, with many competing strands and areas of activity. In the EU and among member states there is, as yet, no clear approach to how to govern this space, let alone to how to wield …
It’s hard to find a major cyberattack over the last five years where identity – generally a compromised password – did not provide the vector of attack. Target, Sony Pictures, Anthem, the Democratic National Committee (DNC), the U.S. Office …
I am pleased to present the European Union (EU) Serious and Organised Crime Threat Assessment 2017 (SOCTA 2017). The SOCTA 2017 is Europol’s flagship product providing information to Europe’s law enforcement community and decisionmakers. It serves as the cornerstone of …
Cybercrime is big business. We hear it so often that the words threaten to lose their impact. But the details still have the capacity to shock. In last year’s report, we demonstrated how attackers launching a malware infection campaign could …
Adversaries have more tools at their disposal than ever before. They also have a keen sense of when to use each one for maximum effect. The explosive growth of mobile endpoints and online traffic works in their favor. They have …
Since the adoption of the EU Cybersecurity Strategy in 2013, the European Commission has stepped up its efforts to better protect Europeans online. It has adopted a set of legislative proposals, in particular on network and information security, earmarked …
The purpose of web application security testing is to find any security weaknesses or vulnerabilities within an application and its environment, to document the vulnerabilities, and to explain how to fix or remediate them. The business drivers behind the testing …
The European Union’s General Data Protection Regulation (GDPR) is the biggest shake-up of global privacy law for over 20 years. Adopted in April 2016, with enforcement due from 25 May 2018, the GDPR represents the culmination of over five years …
Conventional thinking divides the digital and physical worlds into two distinct and separate realms. But is that still true? In preparing this report, the persistent and compelling theme that kept surfacing as we identified our security predictions for 2017 was …
A Candid Survey of Federal Leaders on the State of Cloud Computing In February 2011, White House Chief Information Officer Vivek Kundra authored an ambitious federal policy aimed at elevating cloud computing investments to critical urgency across the federal government. …
If readers are to take only one message from this 2016 Cybersecurity Report for Latin America and the Caribbean (LAC), it would be that the vast majority of our countries are not yet prepared to counteract cybercrime. The analysis is …
Endpoint security represents the frontline in your fight against cyberattackers. Breaches have become commonplace among enterprises, and your employee endpoints and servers are targeted more than any other type of asset (see Figure 1). The effects from these security breaches …
Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Suchexperts and practitioners must therefore relyon their experience, expertise, and knowledge with respect to interpretation and …
Cybercriminals are as varied as other internet users: just as the web has allowed businesses to sell and communicate globally, so it has given fraudsters the ability to plunder victims anywhere and set up crime networks that, previously, would have …
The interviews contained in this volume were written in the summer of 2016, mostly based on discussions between the interviewee and myself – often in person. They are designed to recreate the stimulating discussions. I enjoyed during the research associated …
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from April 1, 2016 through June 30, 2016 (“Q2 2016”) …
Remember Huey Lewis and the News? The blues-rock band sounded retro even when they appeared on the scene with their hit, “Hip to Be Square” in 1983. But you know what? It’s nearly 40 years later, and the airwaves are …
Source: The Amoroso Group
The wise advice of Warren Buffet couldn’t be more relevant than in contemplating the effects of cyber-attacks on financial institutions. As stated in a recent issue of the Federal Deposit Insurance Corporation’s Supervisory Insights, the risks presented by cyber attacks …
While the advent of digital technology has fueled new business models and opportunity, it has also brought an element of risk as valued assets become less tangible, more distributed, and more vulnerable to cyber threats. Today, many different types of …