Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

Home Reports

Reports

Display # 
# Web Link Hits
1   Link   The Perpetual Line-Up Unregulated Police Face Recognition In America
108
2   Link   In 2017, The Insider Threat Epidemic Begins
18
3   Link   2017 Technology, Media and Telecommunications Predictions
11
4   Link   McAfee Labs Threats Report April 2017
3
5   Link   Hostile Drones: The Hostile Use Of Drones By Non-State Actors Against British Targets
586
6   Link   The Imperva Hacker Intelligence Initiative
2069
7   Link   Needle in a datastack: the rise of big security data
1654
8   Link   Report On Securing And Growing The Digital Economy
53
9   Link   NSA's Review of Emerging Technologies
514
10   Link   2016 Data Breach Investigations Report
272
11   Link   HPE Security Research Cyber Risk Report 2016
263
12   Link   MANDIANT: APT1 Exposing One of China’s Cyber Espionage Units
1539
13   Link   The Elderwood Project
1674
14   Link   Latin American and Caribbean Cybersecurity Trends and Government Responses
1567
15   Link   The Impact of Password Meters on Password Selection
2121
16   Link   Child Identity Theft
2297
17   Link   Mcafee mobile security report
1357
18   Link   Dissecting Operation Troy: Cyberespionage in South Korea
1460
19   Link   IAPP-EY Annual Privacy Governance Report 2015
283
20   Link   Socially Engineered Malware Blocking
2090
21   Link   Microsoft Security Intelligence Report
1142
22   Link   2013 INFORMATION SECURITY BREACHES SURVEY
1442
23   Link   Cisco 2014 Annual Security Report
1954
24   Link   THE CURRENT STATE OF CYBERCRIME 2014
1231
25   Link   Data Brokers: A call for transparency and accountability
1075
26   Link   A Primer on Metadata: Separating Fact from Fiction
1065
27   Link   Workplace Privacy, Data Management & Security Report
640
28   Link   Open Crypto Audit Project TrueCrypt
651
29   Link   The State of the "C" in CISO
659
30   Link   Regin: Top-tier espionage tool enables stealthy surveillance
788
31   Link   Symantec 2014 Internet Security Threat Report,
1212
32   Link   Hacking the Human Operating System
682
33   Link   Verizon 2014 Data Breach Investigations Report
1207
34   Link   Report on Cybersecurity and Critical Infrastructure in the Americas
676
35   Link   The Security Impact of Mobile Device Use by Employees
676
36   Link   Regulatin Cross Border Dependencies of Critical Information Infrastructure
563
37   Link   The Black Vine cyberespionage group
475
38   Link   Insider Threats and the Need for Fast and Directed
927
39   Link   2014 Internet Crime Report (FBI IC3)
593
40   Link   APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
509
41   Link   Cloud Security Spotlight Report
642
42   Link   Best Practices for Victim Response and Reporting of Cyber Incidents
525
43   Link   Privacy Laws in Latin America and the Caribbean
568
44   Link   2014 Global Threat Intelligence Report
1526
45   Link   Key findings from the 2015 US State of Cybercrime Survey
411
46   Link   Net Losses: Estimating the Global Cost of Cybercrime
372
47   Link   ATMIA Global Fraud and Security Survey 2015
316
48   Link   The BakerHostetler Data Security Incident Response Report 2015
527
49   Link   2015 Trustwave Global Security Report
368
50   Link   McAfee Labs Threats Report November 2015
351
51   Link   The Cisco 2015 Annual Security Report
521
52   Link   2015 Symantec Internet Security Threat Report
338
53   Link   Prototype Nation The Chinese Cybercriminal Underground in 2015
517
54   Link   2015 Data Privacy Litigation Report
662
55   Link   Managing Insider Risk through Training & Culture
243
56   Link   2015: The Year Data Breaches Got Personal
420
57   Link   Intel Securiyty Grand Theft Data Report
357
58   Link   Verizon 2015 Data Breach Investigations Report
457
59   Link   2016 Dell Security Annual Threat Report
379
60   Link   SANS Top Cyber Security Risks
1725
61   Link   2015 State of SMB Cybersecurity
663
62   Link   Rise of the Drones Managing the Unique Risks Associated with Unmanned Aircraft Systems
118
63   Link   Kingslayer– a supply Chain attack
85
64   Link   Dragnet Surveillance Nation: How Data Brokers Sold Out America
3