Cyber threats and Trends 2019

September 12, 2019

This document is provided in accordance with the terms set forth herein, expressly disclaiming any implied warranties of any kind that may be found to be related. In no event shall the National Cryptologic Centre be held liable for any direct, indirect, incidental or consequential damages arising out of the use of the information and software provided, even if advised of the possibility of such damages.

Spotlight

CYBERCRYPT A/S

Our Vision: A world immune to cyber attacks. We safeguard critical data, assets and devices and help customers build strong defenses against cyber criminals. Cryptography is the cornerstone of today’s cybersecurity. Secure cryptography is unthinkable without keeping keys secret. Yet this very premise is endangered by malware, trojans, and critical vulnerabilities as software, hardware and their supply chains become more complex. This new challenge calls for novel technologies.

OTHER WHITEPAPERS
news image

Cisco’s Private 5G Solution Security Overview

whitePaper | October 12, 2022

Cisco’s Private 5G (P5G) solution, offered as a service, is designed to fit seamlessly into existing enterprise networks and provide private cellular networking capabilities for that enterprise. The solution builds on Cisco’s enterprise networking best practices and a clear understanding of enterprises’ understanding and expectations of private networks.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More

Spotlight

CYBERCRYPT A/S

Our Vision: A world immune to cyber attacks. We safeguard critical data, assets and devices and help customers build strong defenses against cyber criminals. Cryptography is the cornerstone of today’s cybersecurity. Secure cryptography is unthinkable without keeping keys secret. Yet this very premise is endangered by malware, trojans, and critical vulnerabilities as software, hardware and their supply chains become more complex. This new challenge calls for novel technologies.

Events