Curated references

Reports & Breach Studies

Annual and periodic reports used for defensive planning, awareness, and risk assessment.

36 references

ReferenceURL
Verizon Data Breach Investigations Report (DBIR)https://www.verizon.com/business/resources/reports/dbir/
CrowdStrike Global Threat Reporthttps://www.crowdstrike.com/en-gb/global-threat-report/
Microsoft Digital Defense Reporthttps://www.microsoft.com/en-us/security/security-insider/
Google Threat Analysis Group (TAG)https://blog.google/threat-analysis-group/
Mandiant M-Trends (reports)https://www.mandiant.com/resources/reports
IBM X-Force Threat Intelligence Indexhttps://www.ibm.com/reports/threat-intelligence
Sophos Active Adversary Reporthttps://www.sophos.com/en-us/content/active-adversary-report
Palo Alto Networks Unit 42 Researchhttps://unit42.paloaltonetworks.com/research/
Cisco Talos Intelligencehttps://blog.talosintelligence.com/
Rapid7 Researchhttps://www.rapid7.com/research/
Proofpoint Threat Insighthttps://www.proofpoint.com/us/threat-insight
ESET Threat Reportshttps://www.eset.com/int/about/newsroom/reports/
Trend Micro Researchhttps://www.trendmicro.com/en_us/research.html
Cloudflare Radar (security insights)https://radar.cloudflare.com/
Akamai State of the Internet / Securityhttps://www.akamai.com/resources/state-of-the-internet-report
ENISA Threat & Trends (hub)https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends
OWASP Top 10https://owasp.org/www-project-top-ten/
SANS Reading Roomhttps://www.sans.org/white-papers/
Apple Platform Securityhttps://support.apple.com/guide/security/welcome/web
Android Security Bulletinhttps://source.android.com/docs/security/bulletin
Microsoft Security Response Center (MSRC) Update Guidehttps://msrc.microsoft.com/update-guide/
ISO/IEC 27001 (overview)https://www.iso.org/isoiec-27001-information-security.html
NIST SP 800-171https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final
CNCF TAG Securityhttps://tag-security.cncf.io/
Kubernetes Pod Security Standardshttps://kubernetes.io/docs/concepts/security/pod-security-standards/
OWASP Mobile Top 10https://owasp.org/www-project-mobile-top-10/
IETF RFC 3552 (Security Considerations)https://www.rfc-editor.org/rfc/rfc3552
IETF TLS Working Grouphttps://datatracker.ietf.org/wg/tls/about/
CISA Shields Uphttps://www.cisa.gov/shields-up
NCSC Exercise in a Boxhttps://www.ncsc.gov.uk/information/exercise-in-a-box
CIS RAM (Risk Assessment Method)https://www.cisecurity.org/insights/white-papers/cis-risk-assessment-method-ram
Google Project Zerohttps://googleprojectzero.blogspot.com/
Project Zero (About)https://googleprojectzero.blogspot.com/p/about.html
SANS Top 20 / CIS Controls historyhttps://www.sans.org/top20/
MITRE Caldera (adversary emulation)https://caldera.mitre.org/
Let's Encrypt documentationhttps://letsencrypt.org/docs/