Symantec
- Symantec Intelligence Report - August 2014
- Symantec Intelligence Report - July 2014
- Symantec Intelligence Report - June 2014
- Symantec Intelligence Report - May 2014
- Symantec Intelligence Report - February 2014
- Symantec Intelligence Report - January 2014
- Symantec Intelligence Report - December 2013
- Symantec Intelligence Report - November 2013
- Symantec Intelligence Report - October 2013
- Symantec Intelligence Report - September 2013
- Symantec Intelligence Report - August 2013
- Symantec Intelligence Report - July 2013
- Symantec Intelligence Report - June 2013
- Symantec Intelligence Report - May 2013
- Symantec Intelligence Report - February 2013
- Symantec Intelligence Report - January 2013
- Symantec Intelligence Report - December 2012
- Symantec Intelligence Report - November 2012
- Symantec Intelligence Report - Oktober 2012
- Symantec Intelligence Report - September 2012
- Symantec Intelligence Report - August 2012
- Symantec Intelligence Report - July 2012
- Symantec Intelligence Report - June 2012
- Symantec Intelligence Report - May 2012
- Symantec Intelligence Report - February 2012
- Symantec Intelligence Report - January 2012
- Symantec Intelligence Report - November 2011
- Symantec Intelligence Report - October 2011
- Symantec Intelligence Report - September 2011
- Symantec Intelligence Report - August 2011
- Symantec Intelligence Report - July 2011
- Symantec Intelligence Report - June 2011
- Symantec Intelligence Quarterly (April - June 2011)
- Symantec: How safe is your quantified self? (August 2014)
- Symantec: Threats to virtual environments (August 2014)
- Symantec: The State of Financial Trojans 2013 (December 2013)
- Symantec: Mobile Adware and Malware Analysis (October 2013)
- Symantec: ZeroAccess Indepth (October 2013)
- Symantec: State of Enterprise Security (Februar 2010)
-
Symantec Global Internet Security Threat Report
Trends for 2013 Volume XIX, Published April 2014
Symantec Global Internet Security Threat Report
Supplemental Data, Volume XIX, Published April 2014 -
Symantec Global Internet Security Threat Report
Trends for 2012 Volume XVIII, Published April 2013
Symantec Global Internet Security Threat Report
Supplemental Data, Volume XVIII, Published April 2013 -
Symantec Global Internet Security Threat Report
Trends for 2011 Volume XVII, Published April 2012 -
Symantec Global Internet Security Threat Report
Trends for 2010 Volume XVI, Published April 2011 -
Symantec Global Internet Security Threat Report
Trends for 2009 Volume XV, Published April 2010 -
Symantec Internet Security Threat Report April 2010
Regional Data Sheet—Europe, Middle East, and Africa -
Symantec: Internet Security Threat Report Vol. XIV
Trends for 2008 Volume XIV, Published April 2009 -
Symantec Global Internet Security Threat Report
Trends for July–December 07 Volume XIII, Published April 2008 -
Symantec Internet Security Threat Report
Trends for January–June 07 Volume XII, Published September 2007
Sophos
Cisco
- Cisco 2015 Annual Security Report
- Cisco 2014 Annual Security Report
- Cisco 2013 Annual Security Report
- Cisco 2011 Annual Security Report
- Cisco 4Q11 Global Threat Report
- Cisco 2Q11 Global Threat Report
- Cisco 3Q10 Global Threat Report
- Cisco 2Q10 Global Threat Report
- Cisco 2010 Midyear Security Report
- Cisco 2009 Midyear Security Report (July 2009)
Secunia
Microsoft
- Microsoft Security Intelligence Report Volume 16
- Microsoft Security Intelligence Report Volume 15
- Microsoft Security Intelligence Report Volume 14
- Microsoft Security Intelligence Report Volume 13
- Microsoft Security Intelligence Report Volume 12
- Microsoft Security Intelligence Report Volume 11
- Microsoft Security Intelligence Report Volume 10
- Microsoft Security Intelligence Report Volume 9
- Microsoft Security Intelligence Report Volume 8
- Microsoft Security Intelligence Report volume 7
- Microsoft Security Intelligence Report (MS SIR) Vol. 6.
McAfee
IBM
- IBM X-Force Threat Intelligence Quarterly, 3Q 2014
- IBM X-Force Threat Intelligence Quarterly, 2Q 2014
- IBM X-Force Threat Intelligence Quarterly, 1Q 2014
- IBM X-Force 2013 Mid-Year Trend and Risk Report
- IBM X-Force 2013 Mid-Year Trend and Risk Report Executive Summary
- IBM X-Force 2012 Trend and Risk Report
- IBM X-Force 2012 Mid-Year Trend and Risk Report
- IBM X-Force 2011 Trend and Risk Report
- IBM X-Force 2010 Trend and Risk Report
- IBM X-Force 2009 Trend Report
- IBM Internet Security System X-Force - 2008 Trend and Risk Report (January 2009)
Egyéb
- White House (US): Cyberspace Policy Review / Assuring a Trusted and Resilient Information and Communications Infrastructure
- The National Cyber Security Strategy Our Forward Plans (December 2013)
- Cybersecurity Strategy of United Kingdom: Landscape review (February 2013)
- Cybersecurity Strategy of United Kingdom (December 2012)
- Cybersecurity Strategy of United Kingdom (November 2011)
- CSI: 2013 Cyber Crime and Security Survey
- CSI: 2012 Cyber Crime and Security Survey
- 2014 Data Breach Investigations Report (conducted by the Verison RISK Team)
- 2013 Data Breach Investigations Report (conducted by the Verison RISK Team)
- 2012 Data Breach Investigations Report (conducted by the Verison RISK Team)
- 2011 Data Breach Investigations Report (conducted by the Verison RISK Team)
- 2010 Data Breach Investigations Report (conducted by the Verison RISK Team)
- Emerging Cyber Threats Report for 2014 - Georgia Tech Information Security Center
- Emerging Cyber Threats Report for 2013 - Georgia Tech Information Security Center