1. Armerding, T. (2018). The 18 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
2. BaseLine. (2016). The Top Five Cyber Risk Trends in 2016. Retrieved from: http://www.baselinemag.com/security/the-top-5-cyber-risk-trends-in-2016.html
3. Capgemini. (2019). AI in Cyber Security. Retrieved from https://www.sogeti.com/globalassets/common/reports/ai-in-cyber security_report_v05.pdf
4. Engelbrecht, S. (2018). The Evolution of SOAR platforms. Retrieved from https://www.securityweek.com/evolution-soar-platforms
5. Fruhlinger, J. (2019). What is phishing? How this cyber-attack works and how to prevent it. Retrieved from https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html