Cyber Security Standards

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 16-30 of 66 results

   
   
Publication

Joint Publication – Boosting your Organisation’s Cyber Resilience

Authors

Year

  • 2022

Description

  • About In light of rising major cyber threats, the European Union Agency for Cybersecurity (ENISA) an…

 

Joint Publication – Boosting your Organisation’s Cyber Resilience

About In light of rising major cyber threats, the European Union Agency for Cybersecurity (ENISA) and CERT- EU published a joint set of cybersecurity best practices for public and private organisations in the EU. The publication is mainly intended for decision makers (both in IT and general management) and security […]

Publication

Joint international guidance: Principles and approaches to secure-by-design and by-default

Authors

Year

  • 2023

Description

  • About CERT NZ alongside the cybersecurity authorities of Australia, Canada, United States, United Ki…

 

Joint international guidance: Principles and approaches to secure-by-design and by-default

About CERT NZ alongside the cybersecurity authorities of Australia, Canada, United States, United Kingdom, Germany, and Netherlands have published “Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.” Details The joint guidance urges software manufacturers to the steps necessary to ship products that are secure-by-design and […]

Publication

London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme

Authors

Year

  • 2023

Description

  • On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in Lond…

 

London conference on Cyber Resilience: Lessons on cybersecurity capacity-building from the UK’s Digital Access Programme

On 21–22 November 2022, Chatham House hosted the Strengthening Cyber Resilience Conference in London, with support from FCDO and in partnership with KPMG. The conference’s aim was to share experiences and knowledge about how international cybersecurity capacity-building can support national sustainable development and cybersecurity outcomes. The conference also explored the […]

Publication

Cybersecurity of AI and Standarisation

Authors

Year

  • 2023

Description

  • The overall objective of the present document is to provide an overview of standards (existing, bein…

 

Cybersecurity of AI and Standarisation

The overall objective of the present document is to provide an overview of standards (existing, being drafted, under consideration and planned) related to the cybersecurity of artificial intelligence (AI), assess their coverage and identify gaps in standardisation. The report describes the standardisation landscape covering AI, by depicting the activities of […]

Tool

.auCHECK

Authors

Year

  • 2022

Description

  • .auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with au…

 

.auCHECK

.auCheck is an initiative of the Australian Strategic Policy Institute (ASPI) in cooperation with auDA. .auCheck provides a series of tests that check whether internet services follow standards advised by the Australian government and are up to date. .auCheck is a non-commercial, independent and free service. Our mission is to […]

Tool

Mutually Agreed Norms for Routing Security (MANRS)

Authors

Year

  • 2014

Description

  • Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Interne…

 

Mutually Agreed Norms for Routing Security (MANRS)

Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors.

Tool

NetBeacon

Authors

Year

  • 2022

Description

  • NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to r…

 

NetBeacon

NetBeacon is a tool created by the DNS Abuse Institute to empower individuals and organizations to report suspected online abuse and to empower registrars to take action against online abuse. NETBEACON’S MISSION IS TWOFOLD: Make it easy for people to report online abuse. Make it easy for industry to act […]

Tool

Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)

Authors

Year

  • 2022

Description

  • KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and rec…

 

Knowledge-sharing and Instantiating Norms for DNS and Naming Security (KINDNS)

KINDNS is an ICANN initiative to promote voluntary security best practices for authoritative and recursive DNS operators.  It relies on a self-assessment tool that walks users through a series of questions to help them understand where they are positioned in the scale of the practices that the framework promotes. To develop a […]

Publication

Guide to Good Governance in Cybersecurity

Authors

Year

  • 2021

Description

  • Modern day challenges stemming from the increased dependence on cyberspace, and from its interconnec…

 

Guide to Good Governance in Cybersecurity

Modern day challenges stemming from the increased dependence on cyberspace, and from its interconnectivity with society globally, require an array of different responses. Governments, the private sector and civil society have to come together to address the challenges of cybersecurity governance. In addition, legal and policy frameworks will have to […]

Publication

Raising Standards: Data and Artificial Intelligence in Southeast Asia

Authors

Year

  • 2022

Description

  • This publication is the culmination of a year-long research project on two major, interlinked pieces…

 

Raising Standards: Data and Artificial Intelligence in Southeast Asia

This publication is the culmination of a year-long research project on two major, interlinked pieces of the technological puzzle — data and artificial intelligence (AI) — in five Southeast Asian countries: Indonesia, Malaysia, Singapore, Thailand, and Viet Nam. Of importance was the extent to which data has contributed to inclusive […]

Publication

Global Cyber Expertise Magazine – Issue 11 – September 2022

Authors

Year

  • 2022

Description

  • The Global Cyber Expertise Magazine is a joint initiative by the African Union, European Union, Glob…

 

Global Cyber Expertise Magazine – Issue 11 – September 2022

The Global Cyber Expertise Magazine is a joint initiative by the African Union, European Union, Global Forum on Cyber Expertise and Organization of American States. The Magazine aims to provide cyber policymakers and stakeholders insight on cyber capacity building projects, policies and developments globally. In this edition, our cover story […]

Publication

Cyber Capacity Building in Sub-Saharan Africa. 1. Digital technology and development

Authors

Year

  • 2021

Description

  • Increasingly, the global challenges posed by digitalization and cybersecurity are emerging as centra…

 

Cyber Capacity Building in Sub-Saharan Africa. 1. Digital technology and development

Increasingly, the global challenges posed by digitalization and cybersecurity are emerging as central to the organization of development assistance – with consequences for billions of people in the developing world. The distribution of digital technology and connectivity is occurring at an unprecedented pace, offering new opportunities and contributing to economic […]

Publication

The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions

Authors

Year

  • 2021

Description

  • This paper presents an empirical study of the social and cultural aspects of cybersecurity capacity …

 

The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions

This paper presents an empirical study of the social and cultural aspects of cybersecurity capacity building in 78 nations. While nations within geographically defined regions might be expected to share similar attitudes, values, and practices around cybersecurity, this analysis finds that regional differences can be explained largely by cross-national differences […]

Publication

Global Cyber Expertise Magazine – Issue 10 – November 2021

Authors

Year

  • 2021

Description

  • The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …

 

Global Cyber Expertise Magazine – Issue 10 – November 2021

The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, our cover story takes a […]

Publication

Global Cyber Expertise Magazine – Issue 9 – June 2021

Authors

Year

  • 2021

Description

  • The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …

 

Global Cyber Expertise Magazine – Issue 9 – June 2021

The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this issue, our cover story takes a […]

36

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.