Providing an adequate assessment of their cyber-security posture requires companies and organisations to collect information about threats from a wide range of sources. One of such sources is history, intended as the knowledge about past cyber-security incidents, their size, type of attacks, industry sector and so on. Ideally, having a large enough dataset of past security incidents, it would be possible to analyze it with automated tools and draw conclusions that may help in preventing future incidents. Unfortunately, it seems that there are only a few publicly available datasets of this kind that are of good quality. The paper reports our initial efforts in collecting all publicly available security incidents datasets, and building a sing...
Abstract copyright UK Data Service and data collection copyright owner.The Cyber Security Breac...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...
National critical infrastructure and industrial processes are heavily reliant on automation, monitor...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
As Theodore Roosevelt said, “The more you know about the past, the better prepared you are for the f...
Quantitative data about security threats is a precondi-tion for a precise assessment of security ris...
This report discusses data collected on significant cybersecurity incidents from the early 2000s to ...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
2018 10th International Conference on Cyber Conflict, CyCon X: Maximising EffectsTo date, researcher...
This data set is part of a research project that aimed at extending existing taxonomy by incorporati...
An increasing number of cybersecurity incidents prompts organizations to explore alternative securit...
The dataset contains data on 1643 cyber incidents between 01.01.2000 and 20.04.2023 using 60 variabl...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
peer-reviewedCybercrime is estimated to have cost the global economy just under USD 1 trillion in 2...
Abstract copyright UK Data Service and data collection copyright owner.The Cyber Security Breac...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...
National critical infrastructure and industrial processes are heavily reliant on automation, monitor...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
Cyber security incidents can have dramatic economic, social and institutional impact. The task of pr...
As Theodore Roosevelt said, “The more you know about the past, the better prepared you are for the f...
Quantitative data about security threats is a precondi-tion for a precise assessment of security ris...
This report discusses data collected on significant cybersecurity incidents from the early 2000s to ...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
2018 10th International Conference on Cyber Conflict, CyCon X: Maximising EffectsTo date, researcher...
This data set is part of a research project that aimed at extending existing taxonomy by incorporati...
An increasing number of cybersecurity incidents prompts organizations to explore alternative securit...
The dataset contains data on 1643 cyber incidents between 01.01.2000 and 20.04.2023 using 60 variabl...
In recent decades, Information and Communication Technologies (ICT) have significantly evolved, furt...
peer-reviewedCybercrime is estimated to have cost the global economy just under USD 1 trillion in 2...
Abstract copyright UK Data Service and data collection copyright owner.The Cyber Security Breac...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...
National critical infrastructure and industrial processes are heavily reliant on automation, monitor...