Publication
ENISA Threat Landscape – Emerging Trends 2020
Authors
Year
- 2020
Description
- With the start of a new decade, significant changes can be expected in the way we perceive and under…
ENISA Threat Landscape – Emerging Trends 2020
With the start of a new decade, significant changes can be expected in the way we perceive and understand cybersecurity or the security of cyberspace. The report lists relevant cybersecurity challenges and the top five trends with cyberthreats.
Publication
Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence
Authors
Year
- 2020
Description
- INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing …
Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence
INTERPOL and the Council of Europe, in the framework of the GLACY+ Project, cooperate in publishing the Guide for Criminal Justice Statistics on Cybercrime and Electronic Evidence While many governments recognize the need to take action against cybercrime, they face difficulties in defining the problem at hand. To effectively tackle […]
Publication
COVID-19 Cybercrime Analysis Report
Authors
Year
- 2020
Description
- An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift …
COVID-19 Cybercrime Analysis Report
An INTERPOL assessment of the impact of COVID-19 on cybercrime has shown a significant target shift from individuals and small businesses to major corporations, governments and critical infrastructure. With organizations and businesses rapidly deploying remote systems and networks to support staff working from home, criminals are also taking advantage of […]
Publication
Internet Organised Crime Threat Assessment (IOCTA) 2020
Authors
Year
- 2020
Description
- The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats fr…
Internet Organised Crime Threat Assessment (IOCTA) 2020
The IOCTA is Europol’s flagship strategic product highlighting the dynamic and evolving threats from cybercrime. It provides a unique law enforcement focused assessment of emerging challenges and key developments in the area of cybercrime. We are grateful for the many contributions from our colleagues within European law enforcement community and […]
Publication
ASEAN Cyberthreat Assessment 2021
Authors
Year
- 2021
Description
- INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is se…
ASEAN Cyberthreat Assessment 2021
INTERPOL’s ASEAN Cyberthreat Assessment 2021 report outlines how cybercrime’s upward trend is set to rise exponentially, with highly organized cybercriminals sharing resources and expertise to their advantage. It provides strategies for tackling cyberthreats against the context of the pandemic which has seen more people going online using mostly unprotected mobile […]
Tool
Tech Docs: Best Practices
Authors
Year
- 2021
Description
- At Palo Alto Networks, it’s our mission to develop products and services that help you, our custom…
Tech Docs: Best Practices
At Palo Alto Networks, it’s our mission to develop products and services that help you, our customer, detect and prevent successful cyberattacks. We’ve developed our best practice documentation to help you do just that. Whether you’re looking for the best way to secure administrative access to your next-gen firewalls and […]
Tool
Forensic Toolkit (FTK)
Authors
Year
- 2015
Description
- Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis spe…
Forensic Toolkit (FTK)
Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data […]
Tool
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
Authors
Year
- 2020
Description
- This joint advisory is the result of a collaborative research effort by the cybersecurity authoritie…
Joint Cybersecurity Advisory – Technical Approaches to Uncovering and Remediating Malicious Activity
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia Canada New Zealand The United Kingdom The United States It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is […]
Tool
Cyber Security Small Business Guide
Authors
Year
- 2018
Description
- Cyber security needn’t be a daunting challenge for small business owners. Following the five q…
Cyber Security Small Business Guide
Cyber security needn’t be a daunting challenge for small business owners. Following the five quick and easy steps outlined in the guide below could save time, money and even your business’ reputation. This guide can’t guarantee protection from all types of cyber attack, but the steps outlined below can significantly […]
Tool
MITRE ATT&CK
Authors
Year
- 2013
Description
- MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques base…
MITRE ATT&CK
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation […]
Tool
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Authors
Year
- 2021
Description
- Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have pr…
Guide for tech companies considering supporting the Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have produced this ‘by tech, for tech’ guide to operationalising the Voluntary Principles.
Tool
nCSIRT Guide – Self Help
Authors
Year
- 2021
Description
- This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonweal…
nCSIRT Guide – Self Help
This short guide on nCSIRT and cyber standards implementation best practices aims to help Commonwealth countries continue to develop cybersecurity systems.
Publication
Software Supply Chain Attacks | CISA & NIST
Authors
Year
- 2021
Description
- The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of…
Software Supply Chain Attacks | CISA & NIST
The Defending Against Software Supply Chain Attacks, released by CISA and the National Institute of Standards and Technology (NIST), provides an overview of software supply chain risks and recommendations on how software customers and vendors can use the NIST Cyber Supply Chain Risk Management (C-SCRM) Framework and the Secure Software Development Framework (SSDF) […]
Publication
CISA Cybersecurity Resources | CISA
Authors
Year
- 2021
Description
- To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to …
CISA Cybersecurity Resources | CISA
To decrease cybersecurity risks and protect yourself online, CISA offers the following resources to share in your communities and with your stakeholders. These tools are not only valuable during National Cybersecurity Awareness Month (NCSAM) but throughout the year. CISA’s Telework Resources – Telework Guidance and Best Practices As the Nation’s risk […]
Publication
A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State
Authors
Year
- 2019
Description
- The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity an…
A Guide to Critical Infrastructure Security and Resilience | CISA & U.S. Department of State
The U.S. Department of State and the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) developed “A Guide to Critical Infrastructure Security and Resilience” guide to serve as an overview of the U.S. all-hazards approach to critical infrastructure security and resilience. It is intended for both […]