You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/awesome/awesome-agi-cocosci.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ Contributions are greatly welcomed! Please refer to [Contribution Guidelines](ht
135
135
136
136
*[Coalescing the Vapors of Human Experience into a Viable and Meaningful Comprehension](http://web.mit.edu/maxs/www/papers/cogsci_2016_vapors.pdf) - ***CogSci'16***, 2016. [[All Versions](https://scholar.google.com/scholar?cluster=5460385008324352958&hl=en&as_sdt=2005&sciodt=0,5)]. Constrainted thinking as rationalization.
137
137
138
-
*[How We Know What Not To Think](https://www.sciencedirect.com/science/article/pii/S1364661319302311) - ***Trends in Cognitive Sciences***, 2019. [[All Versions](https://scholar.google.com/scholar?cluster=13106919756521743226&hl=en&as_sdt=2005&sciodt=0,5)]. A comprehensive review on rationalization.
138
+
*[How We Know What Not To Think](https://www.sciencedirect.com/science/article/pii/S1364661319302311) - ***Trends in Cognitive Sciences***, 2019. [[All Versions](https://scholar.google.com/scholar?cluster=13106919756521743226)]. A comprehensive review on rationalization.
139
139
140
140
* [Rationalization is rational](https://www.cambridge.org/core/journals/behavioral-and-brain-sciences/article/abs/rationalization-is-rational/2A13B99ED09BD802C0924D3681FEC55B) - ***Behavioral and Brain Sciences***, 2020. [[All Versions](https://scholar.google.com/scholar?cluster=5165464589274056844)]. [[Preprint](https://bpb-us-e1.wpmucdn.com/websites.harvard.edu/dist/0/59/files/2022/03/rationalization_is_rational.pdf)]. Rationalization occurs when a person has performed an action and then concocts the beliefs and desires that would have made it rational. Then, people often adjust their own beliefs and desires to match the concocted ones. While many studies demonstrate rationalization, and a few theories describe its underlying cognitive mechanisms, we have little understanding of its function. Why is the mind designed to construct post hoc rationalizations of its behavior, and then to adopt them? This may accomplish an important task: transferring information between the different kinds of processes and representations that influence our behavior. Human decision making does not rely on a single process; it is influenced by reason, habit, instinct, norms, and so on. Several of these influences are not organized according to rational choice (i.e., computing and maximizing expected value). Rationalization extracts implicit information – true beliefs and useful desires – from the influence of these non-rational systems on behavior.
Copy file name to clipboardexpand all lines: docs/awesome/awesome-annual-security-reports.md
+4
Original file line number
Diff line number
Diff line change
@@ -86,10 +86,13 @@ Reports will be classified by a header that describes their primary content or e
86
86
87
87
## Vulnerabilities
88
88
-[Beyond Trust](https://www.beyondtrust.com/resources/whitepapers/microsoft-vulnerability-report) - [Microsoft Vulnerability Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/BeyondTrust-Microsoft-Vulnerability-Report-2024.pdf) (2024) - Analyzes vulnerabilities in Microsoft products, offering insights into security trends and potential areas of concern for organizations relying on Microsoft technologies.
89
+
-[Edgescan](https://www.edgescan.com/stats-report/) - [Vulnerability Statistics Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/Edgescan-Vulnerability-Statistics-Report-2024.pdf) (2024) Analyzes data from thousands of security assessments and penetration tests on millions of global assets to provide insights into the current state of full-stack security.
89
90
-[Flexera](https://info.flexera.com/SVM-REPORT-Annual-Vulnerability-Review) - [Annual Vulnerability Review](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Flexera-Annual-Vulnerability-Review-2023.pdf) (2023) - Provides a comprehensive analysis of global software vulnerabilities, offering insights into trends, severity, and impact across various software products and vendors.
90
91
-[Nucleus](https://nucleussec.com/chapter-one-state-of-vulnerability-management-ebook/) - [State of Vulnerability Management](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Nucleus-State-of-Vuln-Management-2023.pdf) (2023) - Examines the current state of vulnerability management practices, highlighting challenges, trends, and best practices in identifying and addressing security vulnerabilities.
91
92
-[Qualys](https://www.qualys.com/forms/tru-research-report/) - [TruRisk Threat Research Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Qualys-Trurisk-Threat-Research-Report-2023.pdf) (2023) - Provides an in-depth analysis of vulnerabilities and threats, offering insights into risk assessment and prioritization strategies.
93
+
-[Synack](https://go.synack.com/state-of-vulnerabilities-2024) - [State of Vulnerabilities Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/Synack-State-of-Vulnerabilities-Report-2024.pdf) (2024) This report looks at five industries (healthcare, financial services, U.S. federal government, technology and manufacturing) and their most common vulnerabilities to see how they stack up against each other.
92
94
-[Synopsys](https://www.synopsys.com/software-integrity/resources/analyst-reports/software-vulnerability-trends.html) - [Software Vulnerability Snapshot](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Synopsys-Software-Vulnerability-Snapshot-2023.pdf) (2023) - A snapshot of software vulnerability trends, highlighting common weaknesses, emerging threats, and strategies for improving software security.
95
+
-[Trustwave](https://www.trustwave.com/en-us/resources/library/documents/2024-trustwave-risk-radar-report-financial-services-sector/) - [Financial Services Risk Radar Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/Trustwave-Financial-Services-Risk-Radar-Report-2024.pdf) (2024) Highlights the unique threat landscape facing the financial services sector, focusing on notable trends and the growing risk of insider threats. This report provides key insights into the cybersecurity challenges specific to this industry.
93
96
94
97
## Ransomware
95
98
-[Guidepoint](https://www.guidepointsecurity.com/resources/grit-ransomware-annual-report-2023/) - [GRIT Ransomware Annual Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Guidepoint-Ransomware-Annual_Report-2023.pdf) (2023) - A comprehensive analysis of ransomware trends, attack techniques, and mitigation strategies, providing valuable insights for organizations to enhance their ransomware resilience.
@@ -106,6 +109,7 @@ Reports will be classified by a header that describes their primary content or e
106
109
-[AICD](https://www.aicd.com.au/innovative-technology/digital-business/artificial-intelligence/governance-of-ai.html) - [Directors Introduction to AI](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/AICD-Directors-Introduction-to-AI-2024.pdf) (2024) - Provides an overview of artificial intelligence tailored for directors, highlighting its strategic implications, governance considerations, and best practices for AI implementation in organizations.
107
110
-[IBM](https://www.ibm.com/security/data-breach/threat-intelligence/) - [X-Force Cloud Threat Landscape Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/IBM-X-Force-Cloud-Threat-Landscape-Report-2024.pdf) (2024) - Focuses on threats specific to cloud environments, offering insights into cloud security challenges and strategies for securing cloud infrastructure.
108
111
-[Okta](https://www.okta.com/resources/whitepaper-the-state-of-secure-identity-report/) - [The State of Secure Identity](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2023/Okta-The-State-of-Secure-Identity-2023.pdf) (2023) - Drawing on billions of authentications, this report explores trends and methods of common identity attacks, the role of AI in identity security, and unique attack patterns across industries, regions, and company sizes.
112
+
-[Zimperium](https://www.zimperium.com/global-mobile-threat-report/) - [Global Mobile Threat Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/Zimperium-Global-Mobile-Threat-Report-2024.pdf) (2024) Highlights a growing trend of attackers prioritizing mobile devices as a primary target, focusing on threats like phishing and "mishing" (mobile phishing) covering the enterprise mobile footprint, global threat landscape, and specific industries targeted by these attacks.
109
113
-[Zscaler](https://info.zscaler.com/resources-industry-reports-public-sector-Insights-threatlabz-ai-security-2024) - [ThreatLabz AI Security Report](https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/master/Annual%20Security%20Reports/2024/Threatlabz-AI-Security-Report-2024.pdf) (2024) - Examines the intersection of artificial intelligence and cybersecurity, offering insights into AI-powered threats, defensive applications of AI, and strategies for securing AI systems and models.
0 commit comments