Búsqueda

Cyber security report 2020

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Cyber security report 2020</title>
</titleInfo>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200008286">
<namePart>Check Point Software Technologies </namePart>
<nameIdentifier>MAPA20200008286</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">esp</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">Tel Aviv</placeTerm>
</place>
<publisher>Check Point Software Technologies</publisher>
<dateIssued>2020</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
<extent>80 p.</extent>
</physicalDescription>
<abstract displayLabel="Summary">Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, we offer a review of 2019's major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep your organization safe from cyber attacks. With the popularity of cloud computing and network-connected smartphones, it's no secret that there are more ways to invade an organization. A once hardened network perimeter is now blurred and porous to cyber attacks, and the bad actors are well aware. If there's one clear takeaway from 2019, it's that no organization, big or small, is immune from a devastating cyber attack. Cyber exploits are more sophisticated, illusive, and targeted than ever before. With cybercrime rates estimated to have generated US$1.5 trillion in 2018,1 navigating today's complex cyber threat landscape requires comprehensive cyber security.</abstract>
<abstract displayLabel="Summary">Executive summary: navigating the ver-changing contours of cyber security -- Timeline of 2019´s major cyber events -- 2020 vision: Check Point´s cyber security predictions -- 2019 cyber security trends -- Global malware statistics -- High-profile global vulnerabilities -- Review of 2019 cyber threat predictions -- Recommendations to prevent the next cyber attack -- Zero trust networks: best practices -- Appendix: malware family descriptions</abstract>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080557515">
<topic>Cibernética</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140023066">
<topic>Ciberataques</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080603724">
<topic>Seguridad empresarial</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080623517">
<topic>Protección de la información</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080573577">
<topic>Recomendaciones</topic>
</subject>
<classification authority="">861</classification>
<relatedItem type="series">
<titleInfo>
<title>Check Point Research</title>
</titleInfo>
</relatedItem>
<relatedItem type="series" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200008293">
<titleInfo>
<title>Check Point Research</title>
</titleInfo>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">200420</recordCreationDate>
<recordChangeDate encoding="iso8601">20200420183405.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20200012733</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>