• Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 451-465 of 490 results

   
   
Tool

Align National Campaigns

Authors

Year

  • 2017

Description

  • Cooperation, alignment, and coordination with others is beneficial. In planning and organising an aw…

 

Tool

IBM X-Force Exchange

Authors

Year

  • 2015

Description

  • IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to ra…

 

Tool

The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers

Authors

Year

  • 2017

Description

  • Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. …

 

Tool

GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)

Authors

Year

  • 2017

Description

  • Some elements of ICT have become critical for national security. These elements form the Critical  …

 

Tool

Produce and Present Trusted Metrics about Systemic Risk Conditions

Authors

Year

  • 2017

Description

  • A statistics platform, featuring metrics and data visualisation, allows for the measurement of key i…

 

Tool

Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks

Authors

Year

  • 2017

Description

  • Internet networks are replete with systemic vulnerabilities. CERTs and other trusted  operators req…

 

Publication

Harnessing the Internet of Things for Global Development

Authors

Year

  • 2016

Description

  • This report explores the current use and potential of Internet of Things (IoT) technologies in tackl…

 

Publication

An Internet of Things Reference of Architecture

Authors

Year

  • 2016

Description

  • The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices…

 

Publication

IoT Security Standards Gap Analysis

Authors

Year

  • 2019

Description

  • This study analyses the gaps and provides guidelines for, in particular, the development or repositi…

 

Publication

IoT Security Whitepaper 2018

Authors

Year

  • 2018

Description

  • In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Inst…

 

Publication

International Cyber Norms: Legal, Policy and Industry Perspectives

Authors

Year

  • 2016

Description

  • The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…

 

Publication

Confidence Building Measures and International Cybersecurity

Authors

Year

  • 2013

Description

  • The meeting in Zurich took place at an important moment. Recent events have shown that much remains …

 

Publication

Voluntary, Non-binding Norms for Responsible State Behavior in the Use of ICT – A Commentary

Authors

Year

  • 2017

Description

  • This publication contains a commentary on the voluntary, non-binding norms of responsible State beha…

 

Publication

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Authors

Year

  • 2017

Description

  • The most comprehensive guide for policy advisors and legal experts on how existing International Law…

 

Publication

Cybersecurity: Are We Ready in Latin America and the Caribbean?

Authors

Year

  • 2016

Description

  • The manner in which nation states and regions address cybersecurity capacity is essential for effect…

 

25

more brilliant tools and publications this way