Publication
ENISA Threat Landscape – Emerging Trends 2020
Authors
Year
- 2020
Description
- With the start of a new decade, significant changes can be expected in the way we perceive and under…
ENISA Threat Landscape – Emerging Trends 2020
With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.
Publication
Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence
Authors
Year
- 2020
Description
- INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing …
Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence
INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing the Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence While many governments recognize the need to take action against cybercrime, they face difficulties in defining the problem at hand. To effectively tackle […]
Publication
COVID-19 Cybercrime Analysis Report
Authors
Year
- 2020
Description
- An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift …
COVID-19 Cybercrime Analysis Report
An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure. With organizations and businesses rapidly deploying remote systems and networks to support staff working from home, criminals are also taking advantage of […]
Publication
Internet Organised Crime Threat Assessment (IOCTA) 2020
Authors
Year
- 2020
Description
- The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats fr…
Internet Organised Crime Threat Assessment (IOCTA) 2020
The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats from cybercrime. It provides a unique law enforcement focused assessment of emerging challenges and key developments in the area of cybercrime. We are grateful for the many contributions from our colleagues within European law enforcement community and […]
Publication
ASEAN Cyberthreat Assessment 2021
Authors
Year
- 2021
Description
- INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is se…
ASEAN Cyberthreat Assessment 2021
INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is set to rise exponentially, with highly organized cybercriminals sharing resources and expertise to their advantage. It provides strategies for tackling cyberthreats against the context of the pandemic which has seen more people going online using mostly unprotected mobile […]
Tool
Tech Docs: Best Practices
Authors
Year
- 2021
Description
- At Palo Alto Networks, it’s our mission to develop products and services that help you, our custom…
Tech Docs: Best Practices
At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and […]
Tool
Forensic Toolkit (FTK)
Authors
Year
- 2015
Description
- Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis spe…
Forensic Toolkit (FTK)
Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data […]
Tool
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
Authors
Year
- 2020
Description
- This joint advisory is the result of a collaborative research effort by the cybersecurity authoritie…
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia Canada New Zealand The United Kingdom The United States It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is […]
Tool
Cyber Security Small Business Guide
Authors
Year
- 2018
Description
- Cyber security needn’t be a daunting challenge for small business owners. Following the five q…
Cyber Security Small Business Guide
Cyber security needn’t be a daunting challenge for small business owners. Following the five quick and easy steps outlined in the guide below could save time, money and even your business’ reputation. This guide can’t guarantee protection from all types of cyber attack, but the steps outlined below can significantly […]
Tool
MITRE ATT&CK
Authors
Year
- 2013
Description
- MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques base…
MITRE ATT&CK
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation […]
Tool
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Authors
Year
- 2021
Description
- Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have pr…
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have produced this ‘by tech, for tech’ guide to operationalising the Voluntary Principles.
Publication
Global Cyber Expertise Magazine – Issue 8 – November 2020
Authors
Year
- 2020
Description
- The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and …
Global Cyber Expertise Magazine – Issue 8 – November 2020
The Global Cyber Expertise Magazine is a bi-annual magazine on global cyber policy developments and capacity building projects. The Magazine is jointly published by the African Union, the European Union, the Global Forum on Cyber Expertise and the Organization of American States. In this edition, we see a number of […]
Tool
Directions – Cyber Digital Europe Blog
Authors
Year
- 2020
Description
- Directions is an independent platform* for exchanging and discussing ideas – old and new ones – …
Directions – Cyber Digital Europe Blog
Directions is an independent platform* for exchanging and discussing ideas – old and new ones – on Europe’s place in the digital world and world views on digital Europe. Through analysis, commentaries and interviews, Directions aims to stimulate a European debate and showcase the diversity of voices about the present […]
Publication
2020 Cybersecurity Report: Risks Progress and the Way Forward in Latin America and the Caribbean
Authors
Year
- 2020
Description
- The 2020 Cybersecurity Report surveys the current state of cybersecurity policy and practice in Lati…
2020 Cybersecurity Report: Risks Progress and the Way Forward in Latin America and the Caribbean
The 2020 Cybersecurity Report surveys the current state of cybersecurity policy and practice in Latin America and the Caribbean and offers insight on the regions progress since the 2016 edition. Essays from internationally-recognized experts describe the EU approach to cybersecurity and emerging global threats, trends in Latin America and the […]






