Trends in Cybersecurity 2017-2018

December 14, 2017

That digitization is changing our society is, in itself, nothing new. The speed of change, however, is often underestimated. Technology is not evolving linearly, but exponentially, and our brains are not suited to think exponentially. Some idea of this speed, however, is necessary if we want to understand the significance of the current trends in our society.

Spotlight

Evidence-Based Cybersecurity

The notion of ‘cybersecurity’ in academic literature and the world is still technical. Our work is unique in that we focus on human behavior. We are trying to understand the interactions among the four major actors in the cybercrime ecosystem: cybercriminals, enablers (individuals who support online criminal operations), targets and guardians (official law enforcement agencies and system.

OTHER WHITEPAPERS
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Prevent Advanced Insider Threats With IBM Security Solutions

whitePaper | October 22, 2021

Are you confident that only the right people are getting access to your sensitive business assets? Organizations have to be concerned about privileged insiders compromising security and about outsiders posing as authorized users but who really aren't. Putting effective defenses into place, as a result, requires organizations to look both ways.

Read More

Spotlight

Evidence-Based Cybersecurity

The notion of ‘cybersecurity’ in academic literature and the world is still technical. Our work is unique in that we focus on human behavior. We are trying to understand the interactions among the four major actors in the cybercrime ecosystem: cybercriminals, enablers (individuals who support online criminal operations), targets and guardians (official law enforcement agencies and system.

Events