How stuxnet spreads – a study of infection paths in best practice systems
Cyber Insecurity --The battle to protect data rages on as hackers find new ways to steal and disrupt businesses and lives
Managing and insuring cyber risks - Chamber of Commerce seminar 21 May 2015, Tim Johnson
Better Protect Your Credit Union and Recover from Cybersecurity Breaches in Accordance with NCUA Guidance
Managing and insuring cyber risk - coverage of insurance policies
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New Normal
Invincea-spear-phishing-watering-hole-drive-by-whitepaper-5.17.131.pdf
An efficient Approach of e-Iris Enrolling and Authentication for FS e-Apps Dr. R. Bremananth, Associate Professor, Information Systems and Technology Department,
Fraud and Prevention: Lessons from the Fire Service August 24, 2015 1.