EGUIDE:
In this infographic: We take a look at the worldwide Ransomware landscape from the past 12 months. We will be diving into which areas of the globe have been affected the most, which times of year attacks are most likely to happen and which hackers and groups have been causing most of the trouble.
EGUIDE:
According to cybersecurity company Trellix, the number of vishing attacks in Q4 2022 increased by 142% from Q3 2022. Although the volume of vishing attacks continues to rise, threat researchers say that the role of AI technology in these attacks may have been overestimated.
INFOGRAPHIC:
2021 was a breakout year for ransomware as the cybersecurity attack vector wreaked havoc on organizations around the world. Truth is that this trend is set to continue in 2022 and beyond. In this infographic, we take a look at the worldwide ransomware landscape at the beginning of 2022 and which areas of the globe have been affected the most.
EGUIDE:
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
EZINE:
There is at least one person behind every cyber attack, but beyond that insight, very little known is about them. Rutger Leukfeldt, senior researcher on cyber crime at the Netherlands Institute for the Study of Crime and Law Enforcement, has been trying to get inside the minds of hackers.
EGUIDE:
This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
EGUIDE:
This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
WHITE PAPER:
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
WHITE PAPER:
The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
EGUIDE:
IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.