Skip to content

davidalex89/Infosec-Reports

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 

Repository files navigation

Catalogue of Historical Infosec Reports/Articles

Note: These are publicly available reports which links to their respective authors. You may need to sign up to access them.*

InfoSec Reports

Carbon Black

Carbon Black 2017 Global Threat Report

Carbon Black 2019 Global Incident Response Threat Report

Carbon Black 2019 Global Threat Report

Cisco

Cisco 2014 Annual Cybersecurity Report

Cisco 2015 Annual Cybersecurity Report

Cisco 2016 Annual Cybersecurity Report

Cisco 2017 Annual Cybersecurity Report

Cisco 2018 Annual Cybersecurity Report

Crowdstrike

Crowdstrike 2018 Global Threat Report

Crowdstrike 2019 Global Threat Report

Cylance

Cylance 2017 Threat Report

Cylance 2019 Threat Report

Duo

Duo 2016 Trusted Access Report

Duo 2017 Trusted Access Report

Duo 2018 Trusted Access Report

Duo 2019 Trusted Access Report

ENISA

ENISA 2018 Threat Landscape Report

ENISA 2016 Threat Landscape Report

ENISA 2017 Threat Landscape Report

FFIEC

FFIEC FOIA 2014 Annual Report

FFIEC FOIA 2015 Annual Report

FFIEC FOIA 2016 Annual Report

FFIEC FOIA 2017 Annual Report

FFIEC FOIA 2018 Annual Report

FFIEC 2014 Annual Report

FFIEC 2015 Annual Report

FFIEC 2016 Annual Report

FFIEC 2017 Annual Report

FFIEC 2018 Annual Report

FireEye

FireEye 2014 M-Trends Report

FireEye 2015 M-Trends Report

FireEye 2016 M-Trends Report

FireEye 2017 M-Trends Report

FireEye 2018 M-Trends Report

FireEye 2019 M-Trends Report

FireEye Advanced Threat Report: 2H 2011

FireEye: APT41 Double Dragon: A dual espionage andcyber crime operation

FireEye: THE ROAD AHEAD: CYBER SECURITY IN 2020 AND BEYOND

Mandiant: APT Exposing One of China’s Cyber Espionage Units

FISMA

FISMA 2014-2015 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency

FISMA 2015 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency

FISMA 2016 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency

FISMA 2017 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency

FISMA 2018 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency

Google

Google Transparency: Android ecosystem security

Google Transparency: HTTPS encryption on the web

Google Transparency: Email encryption in transit

Google Transparency: Safe Browsing: malware and phishing

ITU

ITU Global Cybersecurity Index (GCI) 2018

ITU Global Cybersecurity Index (GCI) 2017

Microsoft

Microsoft Security Volume 10: July - December 2010

Microsoft Security Volume 11: January - June 2011

Microsoft Security Volume 12: July - December 2011

Microsoft Security Volume 13: January - June 2012

Microsoft Security Volume 14: July - December 2012

Microsoft Security Volume 15: January - June 2013

Microsoft Security Volume 16: July – December 2013

Microsoft Security Volume 17: January - June 2014

Microsoft Security Volume 18: July - December 2014

Microsoft Security Volume 19: January - June 2015

Microsoft Security Volume 20: July - December 2015

Microsoft Security Volume 21: January - June 2016

Microsoft Security Volume 22: January - March 2017

Microsoft Security Volume 23: February – December 2017

Microsoft Security Volume 24: January - December 2018

NIST

NIST/ITL 2016 Cybersecurity Program Annual Report

NIST/ITL 2017 Cybersecurity Program Annual Report

NTT

NTT 2016 Global Threat Intelligence Report

NTT 2017 Global Threat Intelligence Report

NTT 2018 Global Threat Intelligence Report

NTT 2019 Global Threat Ingelligence Report

SANS

SANS 2016 Security Awareness Report

SANS 2017 Security Awareness Report

SANS 2018 Security Awareness Report

SANS 2019 Security Awareness Report

SANS 2019 Security Awareness Report Package

Verizon

Verizon 2009 DBIR Report

Verizon 2010 DBIR Report

Verizon 2011 DBIR Report

Verizon 2012 DBIR Report

Verizon 2013 DBIR Report

Verizon 2014 DBIR Report

Verizon 2015 DBIR Report

Verizon 2016 DBIR Report

Verizon 2017 DBIR Report

Verizon 2018 DBIR Report

Verizon 2019 DBIR Report

Wombat-Proofpoint

Proofpoint 2015 Human Threat Report

Proofpoint 2015 Threat Report

Proofpoint 2016 Human Threat Report

Proofpoint 2017 Email Fraud Report

Proofpoint 2017 Human Factor Report

Proofpoint 2018 Human Factor Report

Proofpoint 2019 Domain Fraud Report

Proofpoint 2019 Human Factor Report

Proofpoint Q1 2017 Threat Report

Proofpoint Q1 2018 Threat Report

Proofpoint Q1 2019 Threat Report

Proofpoint Q2 2017 Threat Report

Proofpoint Q2 2018 Threat Report

Proofpoint Q3 2017 Threat Report

Proofpoint Q3 2018 Threat Report

Proofpoint Q4 2017 Threat Report

Proofpoint Q4 2018 Threat Report

Wombat/Proofpoint 2016 State of the Phish

Wombat/Proofpoint 2017 State of the Phish

Wombat/Proofpoint 2018 State of the Phish

Wombat/Proofpoint 2019 State of the Phish

Additional

IBM 2019 X-Force Threat Intelligence

Sophos 2019 Threat Report

About

Catalogue of Infosec Articles

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published