Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

Home Reports

Reports

Display # 
# Web Link Hits
1   Link   The Perpetual Line-Up Unregulated Police Face Recognition In America
84
2   Link   Report On Securing And Growing The Digital Economy
38
3   Link   Hostile Drones: The Hostile Use Of Drones By Non-State Actors Against British Targets
549
4   Link   The Imperva Hacker Intelligence Initiative
2057
5   Link   Needle in a datastack: the rise of big security data
1637
6   Link   NSA's Review of Emerging Technologies
425
7   Link   2016 Data Breach Investigations Report
253
8   Link   HPE Security Research Cyber Risk Report 2016
248
9   Link   MANDIANT: APT1 Exposing One of China’s Cyber Espionage Units
1528
10   Link   The Elderwood Project
1661
11   Link   Latin American and Caribbean Cybersecurity Trends and Government Responses
1553
12   Link   The Impact of Password Meters on Password Selection
2107
13   Link   Child Identity Theft
2282
14   Link   Mcafee mobile security report
1343
15   Link   Dissecting Operation Troy: Cyberespionage in South Korea
1448
16   Link   IAPP-EY Annual Privacy Governance Report 2015
251
17   Link   Socially Engineered Malware Blocking
2076
18   Link   Microsoft Security Intelligence Report
1123
19   Link   2013 INFORMATION SECURITY BREACHES SURVEY
1427
20   Link   Cisco 2014 Annual Security Report
1943
21   Link   THE CURRENT STATE OF CYBERCRIME 2014
1206
22   Link   Data Brokers: A call for transparency and accountability
1063
23   Link   A Primer on Metadata: Separating Fact from Fiction
1049
24   Link   Workplace Privacy, Data Management & Security Report
610
25   Link   Open Crypto Audit Project TrueCrypt
635
26   Link   The State of the "C" in CISO
636
27   Link   Regin: Top-tier espionage tool enables stealthy surveillance
766
28   Link   Symantec 2014 Internet Security Threat Report,
1195
29   Link   Hacking the Human Operating System
667
30   Link   Verizon 2014 Data Breach Investigations Report
1196
31   Link   Report on Cybersecurity and Critical Infrastructure in the Americas
635
32   Link   The Security Impact of Mobile Device Use by Employees
649
33   Link   Regulatin Cross Border Dependencies of Critical Information Infrastructure
544
34   Link   The Black Vine cyberespionage group
462
35   Link   Insider Threats and the Need for Fast and Directed
885
36   Link   2014 Internet Crime Report (FBI IC3)
580
37   Link   APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
494
38   Link   Cloud Security Spotlight Report
622
39   Link   Best Practices for Victim Response and Reporting of Cyber Incidents
511
40   Link   Privacy Laws in Latin America and the Caribbean
551
41   Link   2014 Global Threat Intelligence Report
1512
42   Link   Key findings from the 2015 US State of Cybercrime Survey
390
43   Link   Net Losses: Estimating the Global Cost of Cybercrime
355
44   Link   ATMIA Global Fraud and Security Survey 2015
304
45   Link   The BakerHostetler Data Security Incident Response Report 2015
512
46   Link   2015 Trustwave Global Security Report
348
47   Link   McAfee Labs Threats Report November 2015
337
48   Link   The Cisco 2015 Annual Security Report
506
49   Link   2015 Symantec Internet Security Threat Report
319
50   Link   Prototype Nation The Chinese Cybercriminal Underground in 2015
460
51   Link   2015 Data Privacy Litigation Report
631
52   Link   Managing Insider Risk through Training & Culture
213
53   Link   2015: The Year Data Breaches Got Personal
397
54   Link   Intel Securiyty Grand Theft Data Report
346
55   Link   Verizon 2015 Data Breach Investigations Report
445
56   Link   2016 Dell Security Annual Threat Report
358
57   Link   SANS Top Cyber Security Risks
1708
58   Link   2015 State of SMB Cybersecurity
646
59   Link   Rise of the Drones Managing the Unique Risks Associated with Unmanned Aircraft Systems
97
60   Link   Kingslayer– a supply Chain attack
0