Publication
Cybersecurity Economics for Emerging Markets
Authors
Year
- 2024
Description
- In our increasingly interconnected world, where digital technologies are rapidly transforming multip…
Cybersecurity Economics for Emerging Markets
In our increasingly interconnected world, where digital technologies are rapidly transforming multiple aspects of daily life, the critical role of cybersecurity cannot be overstated, especially in developing nations. As these countries strive to harness the power of modern technology to drive economic growth, enhance public services, and elevate living standards, […]
Publication
The Ransomware Playbook and How to Disrupt It
Authors
Year
- 2025
Description
- Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …
The Ransomware Playbook and How to Disrupt It
Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]
Publication
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
Authors
Year
- 2017
Description
- The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]
Publication
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
Authors
Year
- 2017
Description
- This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]
Publication
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
Authors
Year
- 2020
Description
- This guide has been developed so that any company that is going to use, or already uses remote worki…
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]
Publication
A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)
Authors
Year
- 2021
Description
- This guide aims to show the main ways in which cybercriminals compromise the security of companies, …
A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)
This guide aims to show the main ways in which cybercriminals compromise the security of companies, and therefore its information assets and the systems that manage them. It describes the main cyber threats, how to avoid falling prey to them and, if you have suffered an incident, what to do.
Publication
Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)
Authors
Year
- 2021
Description
- The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive compan…
Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)
The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive company information and to implement appropriate measures for prevention and mitigation through the use of good practices. If the ransomware has breached the defensive barriers, this guide shows the main actions to […]
Publication
Applying the right lessons from the negotiation and implementation of the UNTOC and the UNCAC to the implementation of the newly agreed UN ‘cybercrime’ treaty
Authors
Year
- 2024
Description
- The paper explores the different perspectives from the history of UNTOC’s negotiation and implem…
Applying the right lessons from the negotiation and implementation of the UNTOC and the UNCAC to the implementation of the newly agreed UN ‘cybercrime’ treaty
The paper explores the different perspectives from the history of UNTOC’s negotiation and implementation that need to be considered as the convention is sent for formal adoption. First, it undertakes a focused literature review on the UNTOC and UNCAC and its travaux preparatoires of such provisions. The paper explains the […]
Publication
‘This is not a human rights convention!’: the perils of overlooking human rights in the UN cybercrime treaty
Authors
Year
- 2024
Description
- The ongoing process of the UN cybercrime treaty negotiations exemplified concerns about the use of c…
‘This is not a human rights convention!’: the perils of overlooking human rights in the UN cybercrime treaty
The ongoing process of the UN cybercrime treaty negotiations exemplified concerns about the use of criminal law as an instrument for digital persecution. The possible overarching impact of the proposed UN convention goes beyond the notion of cybercrime. If adopted, the new instrument would set standards not only for criminalising […]
Publication
No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime
Year
- 2023
Description
- With cybercrime as an inherently borderless form of crime, the article explores the roles different …
No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime
With cybercrime as an inherently borderless form of crime, the article explores the roles different actors of international law enforcement cooperation have in countering cybercrime. The tools and platforms for global efforts to counter cybercrime offered by international law enforcement organisations include: information and intelligence exchange; capacity-development; and platforms for […]
Publication
Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation
Authors
Year
- 2023
Description
- This three-part article is intended to inform the reader about human-rights-respecting and inclusive…
Learning from the ground up: lessons from civil society engagement in addressing the human rights implications of cybercrime legislation
This three-part article is intended to inform the reader about human-rights-respecting and inclusive approaches to the development of the convention, and draws on case studies to provide evidence-based recommendations. In the first part, it sets out how cybercrime legislation impacts human rights, including both the positive and negative implications of […]
Tool
Cyber Peace Tracer
Authors
Year
- 2025
Description
- The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …
Cyber Peace Tracer
The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.
Tool
How to Build a Security Operations Center (on a budget)
Authors
Year
- 2019
Description
- With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…
How to Build a Security Operations Center (on a budget)
With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]
Tool
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
Authors
Year
- 2024
Description
- This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the …
From Boots on the Ground to Bytes in Cyberspace: A Toolkit providing Comprehensive Guidance on the use of Technologies by Private Security Companies
This toolkit provides a comprehensive guide for Private Security Companies (PSCs) on navigating the complex landscape of Information and Communication Technologies (ICTs) and their impact on human rights. The toolkit is designed for a wide range of PSC stakeholders, including security professionals, management, human rights officers, compliance teams, technology teams, […]
Tool
The global state of cybercrime legislation 2013 – 2024: A cursory overview
Authors
Year
- 2025
Description
- The updated report from the Cybercrime Programme Office of the Council of Europe (C-PROC) provides a…
The global state of cybercrime legislation 2013 – 2024: A cursory overview
The updated report from the Cybercrime Programme Office of the Council of Europe (C-PROC) provides a comprehensive overview of global trends in cybercrime legislation and electronic evidence since 2013. Released in December 2024, the report reveals significant progress in legislative reforms across continents, with approximately 95% of UN Member States […]