Resources

Cyber security in the workplace White Paper

Cyber security in the workplace

A simple guide to cyber security along with some helpful hints and tips to increase the security IQ of your organisation.

Download
Cyber security awareness for your office White Paper

Cyber security awareness for your office

A gentle reminder to everyone in the office of the hints and tips to maintaining good cyber security practices.

Download
How to keep your website safe White Paper

How to keep your website safe

A great addition to any office and a smart way of reminding everyone of the importance of good security for your website.

Download
Social Media for Business White Paper

Social Media for Business

How can you secure your business social media offering? What are the profits and pitfalls? Check out our infographic to find out.

Download
Protecting your business from cyberattacks White Paper

Protecting your business from cyberattacks

CYJAX CEO Kevin McMahon discusses the ever-looming threat of cyberattacks facing small and medium-sized businesses today.

Download
Supply Chain Hardening Project – Lessons Learned White Paper

Supply Chain Hardening Project – Lessons Learned

This White Paper details an example of an international supply chain hardening project which was carried out in a large organisation. It is important to note that CYJAX was not involved in the project in any way. The paper serves as a analysis of the difficulties which may be encountered by companies attempting to enhance their cyber-security strategies through assessing the strengths and weaknesses.

Download
Will Food Become Russia’s Next Weapon? White Paper

Will Food Become Russia’s Next Weapon?

Will Food Become Russia’s Next Weapon?

Download
Ten Ways to Lose Your Crypto White Paper

Ten Ways to Lose Your Crypto

CYJAX has compiled a detailed analysis and understanding of the cryptocurrency industry attack surface, and the findings have been published in this White Paper.

Download
Ukraine in extremis White Paper

Ukraine in extremis

The first section of this White Paper provides some historical and contemporary background to the Russia-Ukraine War one year on from the invasion which took place in 2022. Section Two focuses on cyber-attacks relating to the war. The Conclusion assesses possibilities for the future.

Download
Cryptocurrency Threat Landscape Report – A Year in Review 2022 White Paper

Cryptocurrency Threat Landscape Report – A Year in Review 2022

This White Paper details the main trends and threats identified in the cryptocurrency sector in 2022 and provides some insight into the current threat landscape.

Download
China and Russia in Africa: Talent Acquisition White Paper

China and Russia in Africa: Talent Acquisition

CYJAX has published a new White Paper which analyses the presence of China and Russia in Africa and how their focus on investments, training and teaching new talent can work to their benefit.

Download
Strategic Intelligence Report: Latin America and the Caribbean White Paper

Strategic Intelligence Report: Latin America and the Caribbean

This report outlines Latin America and the Caribbean’s history of instability but notes recent moves towards democracy and increased global interest.

Download
Cloud Threat Landscape Report: Synopsis White Paper

Cloud Threat Landscape Report: Synopsis

CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable threat actors, attacks, vulnerabilities and service abuses that have been observed this year.

Download
Cyber Supply Chain Attacks: Examples and how they happen White Paper

Cyber Supply Chain Attacks: Examples and how they happen

CYJAX’s Latest White Paper: Unveiling Cloud Security Threats in 2023. Explore the evolving threat landscape, prominent threat actors, recent attacks, vulnerabilities, and service abuses. Download now for expert insights.

Download
Cryptocurrency Threat Landscape Report – Q3 2023 White Paper

Cryptocurrency Threat Landscape Report – Q3 2023

Explore the shifting financial landscape, impactful government measures, recent cyber-attacks, delistings, and regulatory actions. Download now for expert insights.

Download
The Cyber Winter of Discontent White Paper

The Cyber Winter of Discontent

The report which analyses the conflict in Ukraine makes predictions as to how Russia may conduct cyber military activity over winter this year.

Download
Broken China? White Paper

Broken China?

This white paper examines China’s economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world’s second-largest economy.

Download
Cryptocurrency Threat Landscape Report – Q1 2024 White Paper

Cryptocurrency Threat Landscape Report – Q1 2024

This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s surge from $42,000 to $73,000, settling around $65,000 by the quarter’s end.

Download
Initial Access Broker Market Summary White Paper

Initial Access Broker Market Summary

This whitepaper explores the Q1 2024 Initial Access Broker Market

Download
Uk Government Department Case Study

Uk Government Department

The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on…

Learn more
Global Pharmaceutical Company Case Study

Global Pharmaceutical Company

The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security…

Learn more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
The Hacktivist Response to UK Foreign Policy Blog

The Hacktivist Response to UK Foreign Policy

Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a…

Read more
Durov arrest and the CYJAX monitoring capability Blog

Durov arrest and the CYJAX monitoring capability

In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments…

Read more
1 2 3 11
Scroll to Top