Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 1-15 of 538 results

   
   
Publication

A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation

Authors

Year

  • 2025

Description

  • Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people …

 

A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation

Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people of different genders differently. Moreover, inattention to gender makes cybersecurity less effective. It introduces unnoticed vulnerabilities into technical systems and policy responses to cyber threats. The underrepresentation of women and people of diverse gender identities, expressions and sexualities within […]

Tool

National AI Cybersecurity Readiness Metric

Authors

Year

  • 2025

Description

  • The metric is designed to support countries at all stages of AI adoption, from those actively implem…

 

National AI Cybersecurity Readiness Metric

The metric is designed to support countries at all stages of AI adoption, from those actively implementing cybersecurity measures to those just beginning to explore AI integration into their strategies. As AI technologies and are quickly evolving, the metric helps nations prepare to defend against the emerging threat landscape. For nations […]

Publication

Cybersecurity Economics for Emerging Markets

Authors

Year

  • 2024

Description

  • In our increasingly interconnected world, where digital technologies are rapidly transforming multip…

 

Cybersecurity Economics for Emerging Markets

In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]

Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Tool

ASEAN Responsible AI Roadmap (2025 – 2030)

Authors

Year

  • 2025

Description

  • The ASEAN Responsible AI Roadmap (2025-2030) (the Roadmap) is developed to provide actionable steps …

 

ASEAN Responsible AI Roadmap (2025 – 2030)

The ASEAN Responsible AI Roadmap (2025-2030) (the Roadmap) is developed to provide actionable steps for ASEAN policymakers and stakeholders to create the ideal conditions for responsible AI to flourish in the region, as well as for AMS to leverage and enable responsible AI in a meaningful, impactful, and sustainable manner […]

Publication

Tech Leap or Tech Lag: Latin America’s Quest to Keep up with Emerging Technologies

Authors

Year

  • 2025

Description

  • This paper analyzes how Latin American and Caribbean (LAC) countries adopt or develop emerging techn…

 

Tech Leap or Tech Lag: Latin America’s Quest to Keep up with Emerging Technologies

This paper analyzes how Latin American and Caribbean (LAC) countries adopt or develop emerging technologies (ET) such as artificial intelligence (AI), the Internet of Things (IoT), quantum computing, 5G networks, and cybersecurity. The region depends on imported technology and lacks internal development, which limits its ability to innovate and compete […]

Publication

Backing up, a Beginner’s Guide for SMEs (Copias de seguridad: una guía de aproximación para el empresario)

Authors

Year

  • 2018

Description

  • This guide provides detailed information on the most relevant aspects of backups, in order to unders…

 

Backing up, a Beginner’s Guide for SMEs (Copias de seguridad: una guía de aproximación para el empresario)

This guide provides detailed information on the most relevant aspects of backups, in order to understand both the importance of their implementation in companies and the different solutions applicable depending on the business model. We must protect our main asset, information, as its loss could disrupt the continuity of our […]

Publication

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that will use, or already uses, an IoT devices is …

 

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

This guide has been developed so that any company that will use, or already uses, an IoT devices is aware of the threats and circumstances that can lead to incidents. It also shows how to protect the device itself and its communications, and therefore the company’s information and business.

Publication

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

Authors

Year

  • 2017

Description

  • The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …

 

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]

Publication

Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • The guide provides the necessary guidelines to establish a suitable contract and to guarantee the se…

 

Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)

The guide provides the necessary guidelines to establish a suitable contract and to guarantee the security aspects of our information assets. In recent years, we have witnessed an enormous increase in the processing and storage capacities of computer systems, as well as a gradual reduction in their cost, aspects which, […]

Publication

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…

 

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]

Publication

Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)

Authors

Year

  • 2019

Description

  • A basic guide to best practices to help you understand and improve the security of your wireless net…

 

Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)

A basic guide to best practices to help you understand and improve the security of your wireless networks. This document aims to provide a basic guide to best practices to help you understand and improve the security of your wireless networks.

Publication

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that is going to use, or already uses remote worki…

 

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]

Publication

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

Authors

Year

  • 2021

Description

  • This guide aims to show the main ways in which cybercriminals compromise the security of companies, …

 

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

This guide aims to show the main ways in which cybercriminals compromise the security of companies, and therefore its information assets and the systems that manage them. It describes the main cyber threats, how to avoid falling prey to them and, if you have suffered an incident, what to do.

Publication

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

Authors

Year

  • 2021

Description

  • The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive compan…

 

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive company information and to implement appropriate measures for prevention and mitigation through the use of good practices. If the ransomware has breached the defensive barriers, this guide shows the main actions to […]

523

more brilliant tools and publications this way

1 2 3 36

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.