Cryptocurrency Threat Landscape Report – A Year in Review 2022
This White Paper details the main trends and threats identified in the cryptocurrency sector in 2022 and provides some insight into the current threat landscape.
This White Paper details the main trends and threats identified in the cryptocurrency sector in 2022 and provides some insight into the current threat landscape.
The first section of this White Paper provides some historical and contemporary background to the Russia-Ukraine War one year on from the invasion which took place in 2022. Section Two focuses on cyber-attacks relating to the war. The Conclusion assesses possibilities for the future.
Cyjax has compiled a detailed analysis and understanding of the cryptocurrency industry attack surface, and the findings have been published in this White Paper.
Will Food Become Russia's Next Weapon?
This White Paper details an example of an international supply chain hardening project which was carried out in a large organisation.
It is important to note that Cyjax was not involved in the project in any way. The paper serves as a analysis of the difficulties which may be encountered by companies attempting to enhance their cyber-security strategies through assessing the strengths and weakn
Cyjax CEO Kevin McMahon discusses the ever-looming threat of cyberattacks facing small and medium-sized businesses today.
Our CISO, Ian Thornton-Trump, shares his cybersecurity insights from more than 20 years in the business.
This guide is intended to help companies and organisations looking for a TI solution to meet their unique requirements. It is focused on advising businesses how best to review and optimise their use of a TI provider. This decision is not to be taken lightly: what suits a company operating in the energy sector, for example, may not be relevant to a healthcare provider.
The main trends in darknet activity from Q3 2020, and the context surrounding these developments.
Businesses and organisations are faced with an ever-increasing number of cybersecurity events, including account take over, ransomware combined with blackmail, and Business Email Compromise (BEC) scams. Choosing the right threat intelligence vendor is critical to dealing with these threats.
You may be familiar with the qualitative risk equation: consequence multiplied by likelihood. Consider a similar approach here. We will assess the consequence of the 4 R’s: Revenue, Reputation, Regulation, and Resiliency. And we will compare them against the likelihood of the 4 D’s: Disruption, Destruction, Degradation, Deception.
How can you secure your business social media offering? What are the profits and pitfalls? Check out our infographic to find out.