Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 301-315 of 538 results

   
   
Publication

ENISA Threat Landscape – Emerging Trends 2020

Authors

Year

  • 2020

Description

  • With the start of a new decade, significant changes can be expected in the way we perceive and under…

 

ENISA Threat Landscape – Emerging Trends 2020

With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.

Publication

Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence

Authors

Year

  • 2020

Description

  • INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing …

 

Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence

INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing the Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence While many governments recognize the need to take action against cybercrime, they face difficulties in defining the problem at hand. To effectively tackle […]

Publication

COVID-19 Cybercrime Analysis Report

Authors

Year

  • 2020

Description

  • An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift …

 

COVID-19 Cybercrime Analysis Report

An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure. With organizations and businesses rapidly deploying remote systems and networks to support staff working from home, criminals are also taking advantage of […]

Publication

Internet Organised Crime Threat Assessment (IOCTA) 2020

Authors

Year

  • 2020

Description

  • The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats fr…

 

Internet Organised Crime Threat Assessment (IOCTA) 2020

The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats from cybercrime. It provides a unique law enforcement focused assessment of emerging challenges and key developments in the area of cybercrime. We are grateful for the many contributions from our colleagues within European law enforcement community and […]

Publication

ASEAN Cyberthreat Assessment 2021

Authors

Year

  • 2021

Description

  • INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is se…

 

ASEAN Cyberthreat Assessment 2021

INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is set to rise exponentially, with highly organized cybercriminals sharing resources and expertise to their advantage. It provides strategies for tackling cyberthreats against the context of the pandemic which has seen more people going online using mostly unprotected mobile […]

Tool

Tech Docs: Best Practices

Authors

Year

  • 2021

Description

  • At Palo Alto Networks, it’s our mission to develop products and services that help you, our custom…

 

Tech Docs: Best Practices

At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and […]

Tool

Forensic Toolkit (FTK)

Authors

Year

  • 2015

Description

  • Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis spe…

 

Forensic Toolkit (FTK)

Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data […]

Tool

Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity

Authors

Year

  • 2020

Description

  • This joint advisory is the result of a collaborative research effort by the cybersecurity authoritie…

 

Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity

This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia Canada New Zealand The United Kingdom The United States It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is […]

Tool

Cyber Security Small Business Guide

Authors

Year

  • 2018

Description

  • Cyber security needn’t be a daunting challenge for small business owners. Following the five q…

 

Cyber Security Small Business Guide

Cyber security needn’t be a daunting challenge for small business owners. Following the five quick and easy steps outlined in the guide below could save time, money and even your business’ reputation. This guide can’t guarantee protection from all types of cyber attack, but the steps outlined below can significantly […]

Tool

MITRE ATT&CK

Authors

Year

  • 2013

Description

  • MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques base…

 

MITRE ATT&CK

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation […]

Tool

Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse

Authors

Year

  • 2021

Description

  • Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have pr…

 

Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse

Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have produced this ‘by tech, for tech’ guide to operationalising the Voluntary Principles.

Tool

nCSIRT Guide – Self Help

Authors

Year

  • 2021

Description

  • This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonweal…

 

nCSIRT Guide – Self Help

This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonwealth countries continue to develop cybersecurity systems.

Publication

Software Supply Chain Attacks | CISA & NIST

Authors

Year

  • 2021

Description

  • The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of…

 

Software Supply Chain Attacks | CISA & NIST

The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) […]

Publication

CISA Cybersecurity Resources | CISA

Authors

Year

  • 2021

Description

  • To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to …

 

CISA Cybersecurity Resources | CISA

To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to share in your communities and with your stakeholders. These tools are not only valuable during National Cybersecurity Awareness Month (NCSAM) but throughout the year. CISA’s Telework Resources – Telework Guidance and Best Practices As the Nation’s risk […]

Publication

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

Authors

Year

  • 2019

Description

  • The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity an…

 

A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State

The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) developed “A Guide to Critical Infrastructure Security and Resilience” guide to serve as an overview of the U.S.  all-hazards approach to critical infrastructure security and resilience.  It is intended for both […]

223

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.