Vesselin Petkov IntroductionShort CV(active tab)Full profilePublicationsShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Commission, European. Proposal for a Directive of the European Parliament and of the Council on Measures for a High Common Level of Cybersecurity across the Union, Rrepealing Directive (EU) 2016/1148(link is external). Brussels, 2020. National Cyber Security Centre. NIS Guidance Collection(link is external)., 2018. NCSC. Cyber Assessment Framework V3.0., 2019. Kellermann, Tom. The Ominous Rise of “Island Hopping” and Counter Incident Response Continues(link is external) In White Paper, VMware Carbon Black., 2019. National Cyber Security Centre. CAF Supply Chain Guidance(link is external)., 2019. Pandey, Shipra, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. "Cyber Security Risks in Globalized Supply Chains: Conceptual Framework." Journal of Global Operations and Strategic Sourcing 13, no. 1 (2020): 103-128. BlueVoyant. Managing Cyber Risk Across the Extended Vendor Ecosystem(link is external)., 2020. Spadafora, Anthony. Energy Giant EDP Hit with RagnarLocker Ransomware(link is external). UK edition. techradar.pro, 2020. Malwarebytes Threat Intelligence Team. Honda and Enel Impacted by Cyber Attack Suspected to be Ransomware(link is external)., 2020. Petcu, Alina Georgiana. Netwalker Ransomware Explained: What You Need to Know(link is external)., 2020. Hassanzadeh, Amin, Amin Rasekh, Stefano Galelli, Mohsen Aghashahi, Riccardo Taormina, Avi Ostfeld, and Katherine M. Banks. "A Review of Cybersecurity Incidents in the Water Sector." Journal of Environmental Engineering 146, no. 5 (2020): 03120003. Kardon, Steve. "Florida Water Treatment Plant Hit with Cyber Attack(link is external)." Industrial Defender (2021). Willemsen, Bert, and Menno Cadee. "Extending the Airport Boundary: Connecting Physical Security and Cybersecurity." Journal of Airport Management 12, no. 3 (2018): 236-247. Johnson, Chris W.. "Preparing for Cyber-attacks on Air Traffic Management Infrastructures: Cyber-safety Scenario Generation." In 7th IET International Conference on Sys¬tem Safety, incorporating the Cyber Security Conference. Edinburgh, UK, 2012. Newman, Lily Hay. Russia’s FireEye Hack Is a Statement—but Not a Catastrophe(link is external). Wired, 2020. Kovacs, Eduard. SolarWinds Says 18,000 Customers May Have Used Compromised Orion Product(link is external). SecurityWeek, 2020. Tidy, Gordon Coreraand. US Treasury and Commerce Department Targeted in Cyber-attack(link is external). BBC News, 2020. Sattler, Jason. "Significant Attacks on Microsoft Exchange ProxyLogon Detected(link is external)." F-Secure (2021). Fruhlinger, Josh. Equifax Data Breach FAQ: What Happened, Who Was Affected, What Was the Impact?(link is external). CSO, 2020. Sonatype. 2020 DevSecOps Community Survey(link is external)., 2021. Sonatype. 2020 State of the Software Supply Chain Report(link is external)., 2020. UK Cabinet Office & Detica. The Cost of Cyber Crime(link is external)., 2011. Ponemon Institute & Accenture Security. The Cost of Cybercrime, 2019(link is external)., 2019. Department for Digital, Culture, Media & Sport. Cyber Security Breaches Survey 2020(link is external)., 2020. Sobb, Theresa, Benjamin Turnbull, and Nour Moustafa. "upply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions." Electronics 9, no. 11 (2020): 1864. Pages« първа ‹ предишна … 486 487 488 489 490 491 492 493 494 … следваща › последна »