Symantec 2016 Internet Security Threat Report The 2016 Internet Security Threat Report (ISTR) provides an overview and analysis of...
Blog
McAfee Labs 2016 Threats Predictions Report Forecasts Changes
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, detection evasion, espionage malware, firmware, IT security industry, McAfee Labs 2016 Threats Predictions Report, threat landscape, 0McAfee Labs 2016 Threats Predictions Report Forecasts Changes The report illustrates an ever-evolving threat landscape, in which applications and...
Cybersecurity Practices for E-Government: An Assessment in Bhutan
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Critical Infrastructure, Cybersecurity Practices, eBusiness, EGovernment, ICS, ICT, Industrial IoT, Information and Communication Technologies, International Conference on e-Business, 0Cybersecurity Practices for E-Government: An Assessment in Bhutan This paper, submitted to the 10th International Conference on e-Business (iNCEB2015)...
IBM 2016 Cyber Security Intelligence Index – Serious data breaches, major attacks and new vulnerabilities
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Energy, Infrastructure, Operational Efficiencies, Security, Cyber Security Intelligence, cybersecurity threats, IBM 2016 Cyber Security Intelligence Index, IBM X-Force, security threats, 0IBM 2016 Cyber Security Intelligence Index – Serious data breaches, major attacks and new vulnerabilities Understand the threat landscape...
Google Security – Android Security 2015 Annual Report
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, Android Security, Chrome Android Safe Browsing, cybersecurity, Google Android Security Annual Report, machine learning, PHA, Potentially Harmful Apps, risk analysis, vulnerable endpoints, 0Google Security – Android Security 2015 Annual Report Enhancing Google’s services to protect Android users In the last year,...
Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions of Users in 2015
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Operational Efficiencies, Security, cybercrime trends, Dell Annual Threat Report, Dell SonicWALL Global Response Intelligence Defense, Exploit kits, Malware attacks, SSL/TLS encryption, 0Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions...
Cisco 2016 Annual Security Report – Achieving Attack Resilience in the Digital Age
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, Infrastructure, Security, China Infrastructure, Cisco 2016 Annual Security Report, Critical Infrastructure, cyberattacks, cybersecurity, cybersecurity trend analyses, Data Breach Investigations Report, defense in depth, Industrial IoT, Innovation, risk analysis, security preparedness, threat intelligence, 0Cisco 2016 Annual Security Report – Achieving Attack Resilience in the Digital Age Digitization creates business value through digitized assets...
Global Cyber Security Capacity Centre: National Cybersecurity Capacity Maturity Model (CMM)
SEC Intelligence Editor - Britta Schmidt, , Cybersecurity, cybersecurity, Global Cyber Security Capacity Centre, Industrial IoT, Innovation, National Cybersecurity Capacity Maturity Model (CMM), SCADA, 0Global Cyber Security Capacity Centre: National Cybersecurity Capacity Maturity Model (CMM) The goal of the Global Cyber Security Capacity...
The AI Revolution: Our Immortality or Extinction
SEC Intelligence Editor - Britta Schmidt, , Thought, Artificial General Intelligence, Artificial Intelligence, Artificial Narrow Intelligence, Artificial Superintelligence, 0The AI Revolution: Our Immortality or Extinction The AI Revolution: Our Immortality or Extinction
The AI Revolution: The Road to Superintelligence
SEC Intelligence Editor - Britta Schmidt, , Thought, Artificial General Intelligence, Artificial Intelligence, Artificial Narrow Intelligence, Artificial Superintelligence, 0The AI Revolution: The Road to Superintelligence The AI Revolution: The Road to Superintelligence
Featured Articles
- Industrial network security best practice advice December 15, 2021
- Industrial Processes Move to the Cloud November 15, 2021
- Cloud-based software solutions for industrial applications October 15, 2021
- 3 Keys to Securing Converged IT/OT Environments September 15, 2021
- ICS SCADA With Secure Clouds August 15, 2021