Publication
The Ransomware Playbook and How to Disrupt It
Authors
Year
- 2025
Description
- Over the years, ransomware groups have improved their ‘playbooks’. This report looks at …
The Ransomware Playbook and How to Disrupt It
Over the years, ransomware groups have improved their ‘playbooks’. This report looks at government actions that aim to counter this new ransomware playbook. Based on the Virtual Routes Ransomware Countermeasures Tracker and insights from Ransom War: How Cybercrime Became a Threat to National Security, the report highlights what is working, what is […]
Publication
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
Authors
Year
- 2017
Description
- The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach …
How to manage an information leak, a Beginner’s Guide for SMEs (Cómo gestionar una fuga de información. Una guía de aproximación al empresario)
The aim of this guide is to help SMEs to understand the steps to take in the event of a data breach incident and to prevent it. The guide is structured in the following sections: Information leakage: concepts, origin and causes. The consequences of an information leak. Estimating the impact. […]
Publication
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
Authors
Year
- 2017
Description
- This guide aims to help the entrepreneur to approach this process in a practical way with keys and s…
Risk Management, a Beginner’s Guide for SMEs (Gestión de riesgos. Una guía de aproximación para el empresario)
This guide aims to help the entrepreneur to approach this process in a practical way with keys and suggestions for assessing risks on a cost-benefit basis. The guide is structured in the following sections: Concepts where the terms used in risk management are introduced. Risk management, which includes the principles, […]
Publication
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
Authors
Year
- 2020
Description
- This guide has been developed so that any company that is going to use, or already uses remote worki…
A Guide for Remote Working in SMEs (Ciberseguridad en el teletrabajo: una guía de aproximación para el empresario)
This guide has been developed so that any company that is going to use, or already uses remote working is aware of the threats and circumstances that can lead to incidents in the event that the necessary security policies have not been correctly established for this purpose. In addition, this […]
Publication
A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)
Authors
Year
- 2021
Description
- This guide aims to show the main ways in which cybercriminals compromise the security of companies, …
A Beginers Guide for Cyberthreats against SMEs (Ciberamenazas contra entornos empresariales: una guía de aproximación)
This guide aims to show the main ways in which cybercriminals compromise the security of companies, and therefore its information assets and the systems that manage them. It describes the main cyber threats, how to avoid falling prey to them and, if you have suffered an incident, what to do.
Publication
Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)
Authors
Year
- 2021
Description
- The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive compan…
Ransomware Guide for SMEs (Ransomware, una guía de aproximación para el empresario)
The aim of this guide is to learn how to detect a ransomware threat to avoid losing sensitive company information and to implement appropriate measures for prevention and mitigation through the use of good practices. If the ransomware has breached the defensive barriers, this guide shows the main actions to […]
Publication
No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime
Year
- 2023
Description
- With cybercrime as an inherently borderless form of crime, the article explores the roles different …
No country is an island: embracing international law enforcement cooperation to reduce the impact of cybercrime
With cybercrime as an inherently borderless form of crime, the article explores the roles different actors of international law enforcement cooperation have in countering cybercrime. The tools and platforms for global efforts to counter cybercrime offered by international law enforcement organisations include: information and intelligence exchange; capacity-development; and platforms for […]
Tool
Cyber Peace Tracer
Authors
Year
- 2025
Description
- The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI …
Cyber Peace Tracer
The platform tracks and analyzes cyber incidents against civil society organizations, leveraging AI to help raise awareness, mitigate threats and drive accountability. It also provides a high-level view of cyber threats and vulnerabilities. You can also find aggregated insights on the geographic distribution of incidents and the sectors most affected.
Tool
How to Build a Security Operations Center (on a budget)
Authors
Year
- 2019
Description
- With limited resources (time, staff, and budget), setting up a security operations center (SOC) supp…
How to Build a Security Operations Center (on a budget)
With limited resources (time, staff, and budget), setting up a security operations center (SOC) supported by multiple security monitoring technologies and near-real-time threat updates doesn’t seem all that DIY. In fact, you may doubt that you’ll have enough full-time and skilled team members to implement and manage these different tools […]
Tool
Ransomware Countermeasures Tracker
Authors
Year
- 2025
Description
- Governments worldwide have initiated various efforts to combat ransomware, a growing threat that dis…
Ransomware Countermeasures Tracker
Governments worldwide have initiated various efforts to combat ransomware, a growing threat that disrupts critical infrastructure, businesses, and individuals. These efforts range from international collaborations to national-level actions, including arrests, sanctions, botnet takedowns, and recovery of ransomware payments. However, the visibility and awareness of these initiatives vary significantly, often leaving […]
Publication
Cost of a Data Breach Report (2024)
Authors
Year
- 2024
Description
- IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to he…
Cost of a Data Breach Report (2024)
IBM’s 2024 Cost of a Data Breach Report, now in its 19th edition, provides valuable insights to help security and IT teams effectively manage risks and mitigate potential financial losses. Key findings from this 2024 research, conducted by the Ponemon Institute and analyzed by IBM, include: The methods through which […]
Publication
Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia
Authors
Year
- 2024
Description
- Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN …
Cybersecurity Threats, Vulnerabilities and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia
Authored by Jaimee Stuart with contributions from Cara Antonaccio and Min Yang, and published by UN Women and the UN University Institute in Macau (UNU), the 2032 report “Cybersecurity Threats, Vulnerabilities, and Resilience Among Women Human Rights Defenders and Civil Society in South-East Asia“ takes a gendered, human-centered approach to […]
Publication
Global Cyber Expertise Magazine – Issue 12 – September 2024
Authors
Year
- 2024
Description
- The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights …
Global Cyber Expertise Magazine – Issue 12 – September 2024
The 12th edition of the Global Cyber Expertise Magazine provides comprehensive updates and insights on global cyber capacity-building initiatives, policies, and developments. This issue highlights the vital work being carried out to secure critical infrastructures and digital economies worldwide. Featured content includes expert interviews and in-depth analyses on key cybersecurity […]
Publication
Ransomware Gangs and Hacktivists: Cyber Threats to Governments in Latin America
Authors
Year
- 2024
Description
- This report assesses ransomware gangs and hacktivists as the main cybersecurity threat to Latin Amer…
Ransomware Gangs and Hacktivists: Cyber Threats to Governments in Latin America
This report assesses ransomware gangs and hacktivists as the main cybersecurity threat to Latin American governments. The group’s objective is to expose corruption, abuse of power, and human rights violations in Latin America. The disclosure of this data significantly impacts public perception and the legitimacy of the affected governments, generating […]
Tool
ITU Global Cybersecurity Index (GCI) v5
Authors
Year
- 2024
Description
- The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countrie…
ITU Global Cybersecurity Index (GCI) v5
The Global Cybersecurity Index (GCI) is a trusted reference that measures the commitment of countries to cybersecurity at a global level – to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each […]