Scenarios for the Future of Cybercrime - White Paper for Decision Makers

January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Spotlight

Any Key Computer Services

"WOW!" Any Key Computer Services is our third IT company in two years and I am very pleased to say that I have foundsomeone that actually does what they say they will do, keeps their appointments on time and keeps me informed of onging work, problem solving and regular updates. I only regret that we didn't find you sooner! Thanks so much!" - P. Yocius, Patrick A. Finn LTD. 7/16/2012. Owned and operated by Tom Riggs, who has 30+ years' experience in the PC, Windows and networking industry, and Helen Riggs, with 25+ years in technical sales, customer service, and sales coaching. Our target market includes small businesses, home-based businesses, and home users.

OTHER WHITEPAPERS
news image

Unify data security, privacy, and governance with contextual data classification

whitePaper | November 29, 2022

Enterprise data can be a transformative asset. It can unlock insights and intelligence to fuel innovation, accelerate organizational growth, and create a significant competitive advantage — so long as it’s properly used.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More

Spotlight

Any Key Computer Services

"WOW!" Any Key Computer Services is our third IT company in two years and I am very pleased to say that I have foundsomeone that actually does what they say they will do, keeps their appointments on time and keeps me informed of onging work, problem solving and regular updates. I only regret that we didn't find you sooner! Thanks so much!" - P. Yocius, Patrick A. Finn LTD. 7/16/2012. Owned and operated by Tom Riggs, who has 30+ years' experience in the PC, Windows and networking industry, and Helen Riggs, with 25+ years in technical sales, customer service, and sales coaching. Our target market includes small businesses, home-based businesses, and home users.

Events