Publication
A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation
Authors
Year
- 2025
Description
- Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people …
A Novel Approach to the 11 UN Norms for Responsible State Behaviour in Cyberspace: Guidelines for Gendered Implementation
Cybersecurity has important implications for gender equality. Cybersecurity incidents affect people of different genders differently. Moreover, inattention to gender makes cybersecurity less effective. It introduces unnoticed vulnerabilities into technical systems and policy responses to cyber threats. The underrepresentation of women and people of diverse gender identities, expressions and sexualities within […]
Publication
Cybersecurity Economics for Emerging Markets
Authors
Year
- 2024
Description
- In our increasingly interconnected world, where digital technologies are rapidly transforming multip…
Cybersecurity Economics for Emerging Markets
In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]
Publication
Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)
Authors
Year
- 2020
Description
- This guide has been developed so that any company that will use, or already uses, an IoT devices is …
Security for deployment and use of IoT in SMEs, a Beginner’s Guide (Seguridad en la instalación y uso de dispositivos IoT: una guía de aproximación para el empresario)
This guide has been developed so that any company that will use, or already uses, an IoT devices is aware of the threats and circumstances that can lead to incidents. It also shows how to protect the device itself and its communications, and therefore the company’s information and business.
Publication
Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)
Authors
Year
- 2017
Description
- The guide provides the necessary guidelines to establish a suitable contract and to guarantee the se…
Cloud Computing, a Beginner’s Guide for SMEs (Cloud computing: una guía de aproximación para el empresario)
The guide provides the necessary guidelines to establish a suitable contract and to guarantee the security aspects of our information assets. In recent years, we have witnessed an enormous increase in the processing and storage capacities of computer systems, as well as a gradual reduction in their cost, aspects which, […]
Publication
Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)
Authors
Year
- 2019
Description
- A basic guide to best practices to help you understand and improve the security of your wireless net…
Security in Wi-Fi networks: a guide for SMEs (Seguridad en redes wifi: una guía de aproximación para el empresario)
A basic guide to best practices to help you understand and improve the security of your wireless networks. This document aims to provide a basic guide to best practices to help you understand and improve the security of your wireless networks.
Publication
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
Authors
Year
- 2020
Description
- This guide has been developed so that any company that is going to use, or already uses remote worki…
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]
Publication
Making the GDPR compliant and competitive: an approach guide for the business owner (Ganar en competitividad cumpliendo el RGPD: una guía de aproximación para el empresario)
Authors
Year
- 2024
Description
- This cybersecurity guide aims to bring the new data protection regulations closer to SMEs, micro-SME…
Making the GDPR compliant and competitive: an approach guide for the business owner (Ganar en competitividad cumpliendo el RGPD: una guía de aproximación para el empresario)
This cybersecurity guide aims to bring the new data protection regulations closer to SMEs, micro-SMEs and the self-employed. The guide proposes guidelines and advice to achieve the proactive security required by the new regulations. The security measures, both organisational and technical, must be justified by a risk analysis of the […]
Tool
How to Build a Security Operations Center (on a budget)
Authors
Year
- 2019
Description
- With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…
How to Build a Security Operations Center (on a budget)
With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]
Tool
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
Authors
Year
- 2024
Description
- This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]
Publication
Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online
Authors
Year
- 2025
Description
- The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 …
Best Practice Forum Cybersecurity (IGF 2024): Mainstreaming capacity building for cybersecurity, trust, and safety online
The output report from the Best Practice Forum (BPF) on Cybersecurity Capacity Building at IGF 2024 presents the key findings from this year’s discussions held in Riyadh, Saudi Arabia. The report delves into the main concerns of cybersecurity and trust, drawing from a series of community consultations that shaped the […]
Publication
Cyber ASEAN Report
Authors
Year
- 2024
Description
- This report is divided into two interlinked sections: Foundation and Application. Setting the contex…
Cyber ASEAN Report
This report is divided into two interlinked sections: Foundation and Application. Setting the context for the report, Part I: Foundation tackles the “so-what” of Cyber ASEAN, specifically the need to reimagine the conduct of cyber capacity-building in Southeast Asia. The report examines the evolution of cybersecurity cooperation in ASEAN before […]
Tool
ITU Global Cybersecurity Index (GCI) v5
Authors
Year
- 2024
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v5
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]
Publication
A principles-based approach to cyber capacity-building (CCB)
Authors
Year
- 2024
Description
- In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-b…
A principles-based approach to cyber capacity-building (CCB)
In 2021, members of the UN Open-ended Working Group (OEWG) agreed 10 principles for cyber capacity-building (CCB). However, to date, the principles have not had the impact that was expected or hoped for. Part of the issue has been a lack of understanding of how best to utilize the principles […]
Tool
Methodology to Classify Unsolicited Email Threats
Authors
Year
- 2024
Description
- Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Diff…
Methodology to Classify Unsolicited Email Threats
Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Differentiating these types of threats is essential to take appropriate mitigation measures and deploy effective security controls. This research delves into the complexities of this issue, examining the diverse categories, inherent threats, and the role of language in […]
Publication
Internet of Things: Embedded Security Guidance
Authors
Year
- 2023
Description
- “Internet of Things: Embedded Security Guidance” is a white paper that advises Internet …
Internet of Things: Embedded Security Guidance
“Internet of Things: Embedded Security Guidance” is a white paper that advises Internet of Things (IoT) vendors on how they can embed security into their devices by default. This publication streamlines the selection and hardening process for IoT vendors by establishing a framework for protocol standards across constrained devices to […]