Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

The classification of Internet of Things (IoT) devices Based on their impact on Living Things (Paper)

English
Spanish

Home

Reports

Display # 
# Web Link Hits
1   Link   The Perpetual Line-Up Unregulated Police Face Recognition In America
168
2   Link   Artificial Intelligence and National Security
21
3   Link   NOT READY FOR TAKEOFF Face Scans at Airport Departure Gates
6
4   Link   Navigating the Future of Mobile Services
9
5   Link   Hostile Drones: The Hostile Use Of Drones By Non-State Actors Against British Targets
685
6   Link   The Imperva Hacker Intelligence Initiative
2118
7   Link   Needle in a datastack: the rise of big security data
1699
8   Link   Report On Securing And Growing The Digital Economy
98
9   Link   NSA's Review of Emerging Technologies
866
10   Link   HPE Security Research Cyber Risk Report 2016
304
11   Link   MANDIANT: APT1 Exposing One of China’s Cyber Espionage Units
1578
12   Link   The Elderwood Project
1723
13   Link   Latin American and Caribbean Cybersecurity Trends and Government Responses
1612
14   Link   The Impact of Password Meters on Password Selection
2162
15   Link   Child Identity Theft
2343
16   Link   Mcafee mobile security report
1398
17   Link   Dissecting Operation Troy: Cyberespionage in South Korea
1495
18   Link   Socially Engineered Malware Blocking
2143
19   Link   Microsoft Security Intelligence Report
1210
20   Link   Data Brokers: A call for transparency and accountability
1124
21   Link   A Primer on Metadata: Separating Fact from Fiction
1120
22   Link   Workplace Privacy, Data Management & Security Report
692
23   Link   Open Crypto Audit Project TrueCrypt
686
24   Link   The State of the "C" in CISO
727
25   Link   Regin: Top-tier espionage tool enables stealthy surveillance
847
26   Link   Hacking the Human Operating System
723
27   Link   Report on Cybersecurity and Critical Infrastructure in the Americas
730
28   Link   The Security Impact of Mobile Device Use by Employees
726
29   Link   Regulatin Cross Border Dependencies of Critical Information Infrastructure
613
30   Link   The Black Vine cyberespionage group
581
31   Link   Insider Threats and the Need for Fast and Directed
1098
32   Link   APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
565
33   Link   Cloud Security Spotlight Report
682
34   Link   Best Practices for Victim Response and Reporting of Cyber Incidents
562
35   Link   Privacy Laws in Latin America and the Caribbean
614
36   Link   Net Losses: Estimating the Global Cost of Cybercrime
413
37   Link   ATMIA Global Fraud and Security Survey 2015
362
38   Link   The BakerHostetler Data Security Incident Response Report 2015
572
39   Link   McAfee Labs Threats Report November 2015
404
40   Link   2015 Data Privacy Litigation Report
704
41   Link   Managing Insider Risk through Training & Culture
330
42   Link   Intel Securiyty Grand Theft Data Report
408
43   Link   2016 Dell Security Annual Threat Report
454
44   Link   SANS Top Cyber Security Risks
1782
45   Link   Rise of the Drones Managing the Unique Risks Associated with Unmanned Aircraft Systems
171
46   Link   Kingslayer– a supply Chain attack
135
47   Link   Dragnet Surveillance Nation: How Data Brokers Sold Out America
86
48   Link   The Ground Truth About Encryption And The Consequences of Extraordinary Access
49
49   Link   In 2017, The Insider Threat Epidemic Begins
146
50   Link   2017 Technology, Media and Telecommunications Predictions
54
51   Link   McAfee Labs Threats Report April 2017
38


Desafíos de Ciberseguridad y Privacidad en el IoT