You are viewing 19 of 25 results
Array
research

Threat Horizon 2024: The disintegration of trust

Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?

Read more
Array
research

Cybersecurity Solutions for a Riskier World

A ThoughtLab study providing evidence-based insights into the most effective cybersecurity practices and investments.

Read more
Array
research

Managing Cyber Threats During Periods of Instability

Seven Proactive Steps Towards Stabilisation

Read more
Array
research

Threat Horizon 2022: Digital and physical worlds collide

By 2022, organisations will be plunged into crisis as ruthless attackers exploit technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.

Read more
Array
research

Demystifying Zero Trust

Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.

Read more
Array
research

Review and Gap Analysis of Cybersecurity Legislation and Cybercriminality Policies in Eight Countries

The ISF, in conjunction with CC-DRIVER, have released a report detailing new methods to prevent, investigate and mitigate cybercrime.

Read more
Array
research

Legal and Regulatory Implications for Information Security: People's Republic of China

Read the latest ISF research on how the Personal Information Protection Law (PIPL) will affect organisations how CII operators must follow and report on data protection and security procedures.

Read more
Array
research

Understanding the ransomware menace

No sector is immune. Ransomware attacks hit police forces, healthcare providers, educational establishments, the oil…

Download Now
Array
research

Extinction Level Attacks: A survival guide

Extinction Level Attacks details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack.

Read more
Array
research

Threat Horizon 2023: Security at a tipping point

Aimed at CISOs, senior leaders and risk executives, the Threat Horizon 2023 identifies nine future threats to information security grouped within three key theme

Read more
Array
research

Human-Centred Security: Positively influencing security behaviour

Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.

Read more
Array
research

ISF CISO Briefing: Adapting to a New World

As countries implement exit strategies from lockdown, the fallout from COVID-19 has presented a complex set of interrelated factors, causing a ripple effect that impacts the global economy, every geographic region, and all industry sectors.

Read more
Array
research

Securing the IoT: Taming the Connected World

The Internet of Things (IoT) has exploded into the connected world and promises much: from…

Read more
Array
research

Demystifying Artificial Intelligence in Information Security

Whilst AI poses new information risks, it can also be used for good and should become a key part of every organisation’s defensive arsenal.

Read more
Array
research

Human-Centred Security: Addressing psychological vulnerabilities

Human-centred security starts with understanding humans and their interaction with technologies, controls and data.

Read more
Array
research

Threat Horizon 2021: The digital illusion shatters – Full report now available to download

The world is now heavily digitised. Technology enables innovative digital business models and society is…

Read more
Array
research

Threat Intelligence: React and Prepare

The digital revolution presents opportunities to identify and exploit the rising value of information. But this same value also attracts unwanted attention and risks.

Read more
Array
research

Building A Successful SOC: Detect Earlier, Respond Faster

Building a successful Security Operations Centre (SOC) can greatly enhance the ability to detect and disrupt cyber attacks, protecting the business from harm.

Read more
Array
research

Protecting the Crown Jewels: How to Secure Mission-Critical Assets

Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised.

Read more