آگاهی امنیتی

 

پیوند منتشر کننده فرمت زمان انتشار
ACSC - Cyber Threat Report Australia’s
cyber security
PDF 2015
BSI - IT Security Situation in Germany  Federal Office for Information Securit y
www.bsi.bund.de
PDF 2011
BSI - IT Security Situation in Germany  Die Lage der IT-Sicherheit in Deutschland PDF 2014
BSI - Threats Catalogue - Elementary Threats noname PDF --‎--‎
CERT Au - Cyber Crime and Security Survey Report CERT Australia’s partner organisations in industry PDF 2012
CERT Au - Cyber Crime and Security Survey Report CERT Australia’s partner organisations in industry PDF 2013
Cisco - Annual Security Report  Cisco PDF 2011
Cisco - Annual Security Report  Cisco PDF 2013
Cisco - Annual Security Report  Cisco PDF 2014
Cisco - Annual Security Report  Cisco PDF 2015
Cisco - Annual Security Report  Cisco PDF 2016
CrowdStrike - Global Threat Report  CrowdStrike PDF 2013
CSI - Computer Crime and Security Survey  14th Annual, Crime
and Security Survey
Executive Summary
PDF december 2009
DHS - Sector Resilience Report Electric Power Delivery 14 JULY 14

Homeland Security- Office of Cyber and Infrastructure Analysis (OCIA)

PDF June 11, 2014
ENISA - Threat Landscape  European union‎ Agency For Network And Information Security PDF JANUARY 2016
FireEye - Advanced Threat Report - 1H FireEye Advanced Threat Report PDF 2012
FireEye - Advanced Threat Report - 2H FireEye Advanced Threat Report PDF 2012
FireEye - Definitive Guide to Next-Generation Threat Protection FireEye, Steve Piper PDF  
Fortinet - The Evolving Threat Landscape in  WHITE PAPER- Fortinet PDF 2016
Frost-Sullivan - ICS2 Global InfoSec Workforce Study  Michael Suby
Global Program Director
Information Security
www.frost.com
PDF 2013
InfoSec - BYOD and Mobile Security InfoSec- BYOD & Mobile Security REPORT PDF 2014
InfoSec - BYOD and Mobile Security InfoSec- BYOD & Mobile Security REPORT PDF 2014
iSight Partners - Executive Perspectives on Cyber Threat Intelligence iSIGHT PDF  
Kaspersky - Energetic Bear - Crouching Yeti - Appendices Kaspersky Lab PDF July, 2014
Kaspersky - Energetic Bear - Crouching Yeti Kaspersky Lab PDF July, 2014
Lockheed-Martin - Cybersecurity in the Oil and Gas Industry Lockheed Martin Corporation PDF 2014
McAfee - Cybercrime Exposed - Cybercrime as a Service Raj Samani, McAfee® Labs PDF 2013
McAfee - Global Threat Intelligence McAfee® Labs PDF 2010
McAfee - Hacking the Human OS McAfee® Labs PDF 2014
McAfee - Reputation - The Foundation of Effective Threat Protection McAfee® Labs PDF 2010
McAfee - Reputation - The Foundation of Effective Threat Protection McAfee® Labs PDF 2010
McAfee - Threat Predictions McAfee® Labs PDF 2012
McAfee - Threat Predictions McAfee® Labs PDF 2015
McAfee - Threat Predictions McAfee® Labs PDF 2016
McAfee - Threat Report McAfee® Labs PDF 2012
McAfee - Threat Report McAfee® Labs PDF 2012
McAfee - Threat Report McAfee® Labs PDF 2012
McAfee - Threat Report McAfee® Labs PDF 2012
McAfee - Threat Report McAfee® Labs PDF 2013
McAfee - Threat Report McAfee® Labs PDF 2013
McAfee - Threat Report McAfee® Labs PDF 2013
Microsoft - Security Intelligence Report - Vol 12 2H Microsoft Security Intelligence Report PDF December, 2011
Microsoft - Security Intelligence Report - Vol 13 1H Microsoft Security Intelligence Report PDF June, 2012
Microsoft - Security Intelligence Report - Vol 14 2H Microsoft Security Intelligence Report PDF December, 2012
Microsoft - Security Intelligence Report - Vol 15 1H Microsoft Security Intelligence Report PDF June, 2013
Microsoft - Security Intelligence Report - Vol 16 2H Microsoft Security Intelligence Report PDF December, 2013
Microsoft - Security Intelligence Report - Vol 17 1H Microsoft Security Intelligence Report PDF June, 2014
Microsoft - Security Intelligence Report - Vol 18 2H Microsoft Security Intelligence Report PDF December, 2014
Microsoft - Security Intelligence Report - Vol 19 1H - Key Findings Microsoft Security Intelligence Report PDF June, 2015
Microsoft - Security Intelligence Report - Vol 19  - Worldwide Threat Assessment Microsoft Security Intelligence Report PDF June, 2015
Microsoft - Security Intelligence Report - Vol 19 1H Microsoft Security Intelligence Report PDF June, 2015
NETRESEC - SCADA Network Forensics Erik Hjelmvik PDF 2014-10-22
NTT - Global Threat Intelligence Report NTT Innovation Institute PDF 2014
Palo Alto - Application Usage and Threat Report - Unit 42 Palo Alto Networks PDF  
SANS - State of Security in Control Systems Today ICS-SANS FDF 2015
Secunia - Vulnerability Review Secunia PDF 2015
Symantec - Intelligence Report Symantec Intelligence PDF Feb, 2013
Symantec - Internet Security Threat Report Symantec Intelligence PDF April 2013
Symantec - Security Response - Dragonfly v1.2 Symantec Intelligence PDF July 2, 2014
Symantec - Security Response - Dragonfly v1.2 Symantec Intelligence PDF January 13, 2014,
Trend Micro - Report on Cybersecurity and Critical Infrastructure in Americas Trend Micro Incorporated PDF 2015
Trend Micro - Spear-Phishing Email - Most Favored APT Attack Bait Trend Micro Incorporated PDF 2012
Verizon -Data Breach Investigations Report Verizon RISK Team PDF 2012
Verizon -Data Breach Investigations Report Verizon RISK Team PDF 2013
Verizon - Data Breach Investigations Report Verizon RISK Team PDF 2014
Verizon - Data Breach Investigations Report Verizon RISK Team PDF 2015
Verizon - Data Breach Investigations Report Verizon RISK Team PDF 2016

 

 

کد: 50012731

زمان انتشار: چهارشنبه 19 مهر 1396 08:30 ب.ظ

تعداد نمایش: 79

ورود به سامانه


نام کاربری
گذر واژه
کد امنیتی

شبکه های اجتماعی

ما را در شبکه های اجتماعی دنبال کنید