The DMARC Intelligence Report

In less than three years, the DMARC standard has reshaped the email fraud landscape, disrupted longstanding phishing strategies, and forced cybercriminals to abandon preferred targets. Today, DMARC is still the best remedy in the fight against phishing and spoofing. As its implementation continues to spread outward from its early adopters, it has the potential to nullify an entire class of fraud within the next few years.

Spotlight

ISSP

Information Systems Security Partners provides full cycle professional cyber security services: from compromise and vulnerability assessment, penetration and security testing as well as cybersecurity consulting to integration of cybersecurity technologies, digital forensics, managed security services, managed detection and response services, and threat intelligence. We help businesses, organizations, industries, governments, and academia face the challenge of dealing with the constant threat of cyberattacks and protect critical systems, networks and data from ever increasing and constantly evolving cyber threats. ISSP consulting and integration unit provides integration and support of cybersecurity technologies, turn-key cybersecurity solutions as well as stand- alone services of cybersecurity consulting, compromise and vulnerability assessment, penetration and security testing.

OTHER WHITEPAPERS
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

2023 Data Protection Trends Executive Brief United States Edition

whitePaper | February 8, 2023

In late 2022, an independent research firm completed their survey of 4,200 unbiased IT leaders and implementers on a variety of data protection drivers, challenges, and strategies — including 1175 in United States. This broad-based market study on unbiased organizations is conducted annually on Veeam’s behalf to understand how the data protection market continues to evolve, so that Veeam can ensure product strategies and market initiatives align with where the market is going.

Read More

Spotlight

ISSP

Information Systems Security Partners provides full cycle professional cyber security services: from compromise and vulnerability assessment, penetration and security testing as well as cybersecurity consulting to integration of cybersecurity technologies, digital forensics, managed security services, managed detection and response services, and threat intelligence. We help businesses, organizations, industries, governments, and academia face the challenge of dealing with the constant threat of cyberattacks and protect critical systems, networks and data from ever increasing and constantly evolving cyber threats. ISSP consulting and integration unit provides integration and support of cybersecurity technologies, turn-key cybersecurity solutions as well as stand- alone services of cybersecurity consulting, compromise and vulnerability assessment, penetration and security testing.

Events