Cyber Security Standards

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 66 results

   
   
Publication

A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation

Authors

Year

  • 2025

Description

  • Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people …

 

A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation

Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people of different genders differently. Moreover, inattention to gender makes cybersecurity less effective. It introduces unnoticed vulnerabilities into technical systems and policy responses to cyber threats. The underrepresentation of women and people of diverse gender identities, expressions and sexualities within […]

Publication

Cybersecurity Economics for Emerging Markets

Authors

Year

  • 2024

Description

  • In our increasingly interconnected world, where digital technologies are rapidly transforming multip…

 

Cybersecurity Economics for Emerging Markets

In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]

Publication

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that will use, or already uses, an IoT devices is …

 

Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)

This guide has been developed so that any company that will use, or already uses, an IoT devices is aware of the threats and circumstances that can lead to incidents. It also shows how to protect the device itself and its communications, and therefore the company’s information and business.

Publication

Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • The guide provides the necessary guidelines to establish a suitable contract and to guarantee the se…

 

Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)

The guide provides the necessary guidelines to establish a suitable contract and to guarantee the security aspects of our information assets. In recent years, we have witnessed an enormous increase in the processing and storage capacities of computer systems, as well as a gradual reduction in their cost, aspects which, […]

Publication

Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)

Authors

Year

  • 2019

Description

  • A basic guide to best practices to help you understand and improve the security of your wireless net…

 

Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)

A basic guide to best practices to help you understand and improve the security of your wireless networks. This document aims to provide a basic guide to best practices to help you understand and improve the security of your wireless networks.

Publication

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that is going to use, or already uses remote worki…

 

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]

Publication

Making the GDPR compliant and competitive: an approach guide for the business owner (Ganar en competitividad cumpliendo el RGPD: una guía de aproximación para el empresario)

Authors

Year

  • 2024

Description

  • This cybersecurity guide aims to bring the new data protection regulations closer to SMEs, micro-SME…

 

Making the GDPR compliant and competitive: an approach guide for the business owner (Ganar en competitividad cumpliendo el RGPD: una guía de aproximación para el empresario)

This cybersecurity guide aims to bring the new data protection regulations closer to SMEs, micro-SMEs and the self-employed. The guide proposes guidelines and advice to achieve the proactive security required by the new regulations. The security measures, both organisational and technical, must be justified by a risk analysis of the […]

Tool

How to Build a Security Operations Center (on a budget)

Authors

Year

  • 2019

Description

  • With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…

 

How to Build a Security Operations Center (on a budget)

With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]

Tool

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

Authors

Year

  • 2024

Description

  • This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …

 

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]

Publication

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

Authors

Year

  • 2025

Description

  • The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 …

 

Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online

The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 presents the key findings from this year’s discussions held in Riyadh, Saudi Arabia. The report delves into the main concerns of cybersecurity and trust, drawing from a series of community consultations that shaped the […]

Publication

Cyber ASEAN Report

Authors

Year

  • 2024

Description

  • This report is divided into two interlinked sections: Foundation and Application. Setting the contex…

 

Cyber ASEAN Report

This report is divided into two interlinked sections: Foundation and Application. Setting the context for the report, Part I: Foundation tackles the “so-what” of Cyber ASEAN, specifically the need to reimagine the conduct of cyber capacity-building in Southeast Asia. The report examines the evolution of cybersecurity cooperation in ASEAN before […]

Tool

ITU Global Cybersecurity Index (GCI) v5

Authors

Year

  • 2024

Description

  • The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…

 

ITU Global Cybersecurity Index (GCI) v5

The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]

Publication

A principles-based approach to cyber capacity-building (CCB)

Authors

Year

  • 2024

Description

  • In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-b…

 

A principles-based approach to cyber capacity-building (CCB)

In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-building (CCB). However, to date, the principles have not had the impact that was expected or hoped for. Part of the issue has been a lack of understanding of how best to utilize the principles […]

Tool

Methodology to Classify Unsolicited Email Threats

Authors

Year

  • 2024

Description

  • Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Diff…

 

Methodology to Classify Unsolicited Email Threats

Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Differentiating these types of threats is essential to take appropriate mitigation measures and deploy effective security controls. This research delves into the complexities of this issue, examining the diverse categories, inherent threats, and the role of language in […]

Publication

Internet of Things: Embedded Security Guidance

Authors

Year

  • 2023

Description

  • “Internet of Things: Embedded Security Guidance” is a white paper that advises Internet …

 

Internet of Things: Embedded Security Guidance

“Internet of Things: Embedded Security Guidance” is a white paper that advises Internet of Things (IoT) vendors on how they can embed security into their devices by default. This publication streamlines the selection and hardening process for IoT vendors by establishing a framework for protocol standards across constrained devices to […]

51

more brilliant tools and publications this way

1 2 3 5

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.