Cybercrime

  • Regions

  • Countries

  • Themes & Topics

  • Tags

  • Clear All

Showing 1-15 of 131 results

   
   
Publication

Cybersecurity Economics for Emerging Markets

Authors

Year

  • 2024

Description

  • In our increasingly interconnected world, where digital technologies are rapidly transforming multip…

 

Cybersecurity Economics for Emerging Markets

In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]

Publication

The Ransomware Playbook and How to Disrupt It

Authors

Year

  • 2025

Description

  • Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …

 

The Ransomware Playbook and How to Disrupt It

Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]

Publication

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

Authors

Year

  • 2017

Description

  • The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …

 

How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)

The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]

Publication

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

Authors

Year

  • 2017

Description

  • This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…

 

Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)

This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]

Publication

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

Authors

Year

  • 2020

Description

  • This guide has been developed so that any company that is going to use, or already uses remote worki…

 

A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)

This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]

Publication

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

Authors

Year

  • 2021

Description

  • This guide aims to show the main ways in which cybercriminals compromise the security of companies, …

 

A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)

This guide aims to show the main ways in which cybercriminals compromise the security of companies, and therefore its information assets and the systems that manage them. It describes the main cyber threats, how to avoid falling prey to them and, if you have suffered an incident, what to do.

Publication

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

Authors

Year

  • 2021

Description

  • The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive compan…

 

Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)

The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive company information and to implement appropriate measures for prevention and mitigation through the use of good practices. If the ransomware has breached the defensive barriers, this guide shows the main actions to […]

Publication

Applying the right lessons from the negotiation and implementation of the UNTOC and the UNCAC to the implementation of the newly agreed UN ‘cybercrime’ treaty

Authors

Year

  • 2024

Description

  • The paper explores  the different perspectives from the history of UNTOC’s negotiation and implem…

 

Applying the right lessons from the negotiation and implementation of the UNTOC and the UNCAC to the implementation of the newly agreed UN ‘cybercrime’ treaty

The paper explores  the different perspectives from the history of UNTOC’s negotiation and implementation that need to be considered as the convention is sent for formal adoption. First, it undertakes a focused literature review on the UNTOC and UNCAC and its travaux preparatoires of such provisions. The paper explains the […]

Publication

‘This is not a human rights convention!’: the perils of overlooking human rights in the UN cybercrime treaty

Authors

Year

  • 2024

Description

  • The ongoing process of the UN cybercrime treaty negotiations exemplified concerns about the use of c…

 

‘This is not a human rights convention!’: the perils of overlooking human rights in the UN cybercrime treaty

The ongoing process of the UN cybercrime treaty negotiations exemplified concerns about the use of criminal law as an instrument for digital persecution. The possible overarching impact of the proposed UN convention goes beyond the notion of cybercrime. If adopted, the new instrument would set standards not only for criminalising […]

Publication

No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime

Year

  • 2023

Description

  • With cybercrime as an inherently borderless form of crime, the article explores the roles different …

 

No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime

With cybercrime as an inherently borderless form of crime, the article explores the roles different actors of international law enforcement cooperation have in countering cybercrime. The tools and platforms for global efforts to counter cybercrime offered by international law enforcement organisations include: information and intelligence exchange; capacity-development; and platforms for […]

Publication

Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation

Authors

Year

  • 2023

Description

  • This three-part article is intended to inform the reader about human-rights-respecting and inclusive…

 

Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation

This three-part article is intended to inform the reader about human-rights-respecting and inclusive approaches to the development of the convention, and draws on case studies to provide evidence-based recommendations. In the first part, it sets out how cybercrime legislation impacts human rights, including both the positive and negative implications of […]

Tool

Cyber Peace Tracer

Authors

Year

  • 2025

Description

  • The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …

 

Cyber Peace Tracer

The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.

Tool

How to Build a Security Operations Center (on a budget)

Authors

Year

  • 2019

Description

  • With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…

 

How to Build a Security Operations Center (on a budget)

With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]

Tool

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

Authors

Year

  • 2024

Description

  • This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …

 

From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies

This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]

Tool

The global state of cybercrime legislation 2013 – 2024: A cursory overview

Authors

Year

  • 2025

Description

  • The updated report from the Cybercrime Programme Office of the Council of Europe (C-PROC) provides a…

 

The global state of cybercrime legislation 2013 – 2024: A cursory overview

The updated report from the Cybercrime Programme Office of the Council of Europe (C-PROC) provides a comprehensive overview of global trends in cybercrime legislation and electronic evidence since 2013. Released in December 2024, the report reveals significant progress in legislative reforms across continents, with approximately 95% of UN Member States […]

116

more brilliant tools and publications this way

1 2 3 9

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.