Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming c...
Today, businesses observe change in priorities, and data intelligence becomes one of the key drivers...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
This paper aims to demonstrate the use of Open Source Intelligence (OSINT) techniques to gather publ...
The ever-increasing amount of major security incidents has led to an emerging interest in cooperativ...
As Theodore Roosevelt said, “The more you know about the past, the better prepared you are for the f...
Cyber Security experts are trying to find solutions to prevent cyber-attacks and one of the main sol...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
The need for increased national cyber security situational awareness is evident from the growing num...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
In a continually evolving cyber-threat landscape, the detection and prevention of cyber attacks has ...
Providing an adequate assessment of their cyber-security posture requires companies and organisation...
Today, businesses observe change in priorities, and data intelligence becomes one of the key drivers...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
This paper aims to demonstrate the use of Open Source Intelligence (OSINT) techniques to gather publ...
The ever-increasing amount of major security incidents has led to an emerging interest in cooperativ...
As Theodore Roosevelt said, “The more you know about the past, the better prepared you are for the f...
Cyber Security experts are trying to find solutions to prevent cyber-attacks and one of the main sol...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
The need for increased national cyber security situational awareness is evident from the growing num...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
In a continually evolving cyber-threat landscape, the detection and prevention of cyber attacks has ...
Providing an adequate assessment of their cyber-security posture requires companies and organisation...
Today, businesses observe change in priorities, and data intelligence becomes one of the key drivers...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...