The Institute for Critical Infrastructure Technology released a report describing how ransomware has developed, the types of ransomware, how they are distributed, what the main targets are for ransomware, and what to do if your system is compromised.
Cisco released a guide describing ransomware and recommendations for preventing a ransomware infection.
The Office of the New York State Comptroller released a guide on ransomware, what to do before paying the ransom, and how to reduce your chances of falling victim to ransomware attacks.
Bromium released a report analyzing Crypto-Ransomware. Crypto-Ransomware uses strong encryption to lock files on a victim's computer until the ransom is payed. This report includes analysis of several versions of malware including CryptoLocker, Cryptowall/Cryptodefense, and TorrentLocker. It also includes the most common files encrypted by this malware and
List of Insider Threat Publications from CERT, Software Engineering Institute and Carnegie Mellon University.
This brochure serves as an introduction for managers and security personnel on how to detect an insider threat and provides tips on how to safeguard your company’s trade secrets.
Abstract: Ensuring that devices on a network are not vulnerable is hard to do. Comply to Connect (C2C) simplifies this by enforcing that patches and hardened configuration are applied to devices before they connect and updated continually. Learn about the benefits of C2C and how easily it can be leveraged to improve most networks. Date Published: 18
The Cyber Proving Ground (CPG) is a collaborative effort between 24th Air Force, 25th Air Force, and the Air Force Life Cycle Management Center. It enables and supports high performance teams assembled from the breadth of the Air Force cyber community of interest and external partners to rapidly assess the applicability of emerging concepts and technologies
Modern weapons systems have depended on microelectronics since the inception of integrated circuits over fifty years ago. Today, most electronics contain programmable components of ever increasing complexity. At the same time, the Department of Defense (DoD) has become a far less influential buyer in a vast, globalized supplier base.3 Consequently, assuring
This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems,