Search Results
-
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
by Lillian Ablon • Andy BogartZero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can info... More
Language: ENGCopyright: 2017 -
The Defender's Dilemma: Charting a Course Toward Cybersecurity
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures and the countermeas... More
Language: ENGCopyright: 2015 -
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward d... More
Language: ENGCopyright: 2016 -
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these mark... More
Language: ENGCopyright: 2014