Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

SecureWorks

Below you will find reports with the source of “SecureWorks”

image from Threat Intelligence Executive Report 2020 Vol. 3

Threat Intelligence Executive Report 2020 Vol. 3

The Threat Intelligence Executive Report by Secureworks analyzes security threats and helps organizations protect their systems. During March and April of 2020, Secureworks noticed 3 developments in threat intelligence: Multiple threat actors leverage COVID-19, Remote access security is essential in the current working environment, and big breaches begin with small intrusions. (more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 2

Threat Intelligence Executive Report 2020 Vol. 2

The Threat Intelligence Executive Report by Secureworks analyzes security threats and aims to help organizations protect their systems. In the first two months of 2020, they identified 3 main trends: Lesser-known government-sponsored threat groups putting data at risk, Citrix vulnerability disclosure causing spikes in incidents, and ransomware operators leveraging risk of GDPR fines as a threat. (more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. (more available)
Added: July 8, 2020
image from 2018 State of Cybercrime

2018 State of Cybercrime

From July 2017 through June 2018, Secureworks CTU researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. (more available)
Added: February 27, 2019
image from SecureWorks Threat Intelligence Executive Monthly Report April 2016

SecureWorks Threat Intelligence Executive Monthly Report April 2016

This report from April 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues. (more available)
Added: October 26, 2018
image from Threat Intelligence Executive Report 2018: Volume 2

Threat Intelligence Executive Report 2018: Volume 2

This Threat report details some early 2018 threats like ransomware, North Korean hacking, the leveraging of newly exposed vulns.
Added: October 26, 2018
image from 2018 Incident Response Insights Report

2018 Incident Response Insights Report

This report shares insights and valuable lessons from an examination of the threats in 2017.
Added: October 25, 2018
image from Threat Intelligence Executive Report 2017: Volume 2

Threat Intelligence Executive Report 2017: Volume 2

This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools. (more available)
Added: October 25, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. (more available)
Added: October 24, 2018
image from Threat Intelligence Executive Report 2018: Volume 1

Threat Intelligence Executive Report 2018: Volume 1

This Threat report details some early 2018 threats like cryoticurrency mining, hardware vulns, and government sponsored cyber threats.
Added: October 24, 2018
image from EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

EMA Report Summary: Integrating SecOps With Operations, Development, and ITSM In The Age Of Cloud And Agile

This report uniquely addresses SecOps initiatives in terms of role, team leadership, success rates, company size, vertical adoptions, and geography. It provides telling insights into technology priorities, process, and best practices and metrics for critical use cases—including integrated security/ compliance for performance and availability management, change and configuration management, and IT asset management and audits. (more available)
Added: October 23, 2018
image from Threat Intelligence Executive Report 2017: Volume 1

Threat Intelligence Executive Report 2017: Volume 1

This Threat Report takes a look at some of the events of Early 2017. Specifically, it looks at how weak and outdated software enabled breaches, threats leveraged legitimate features, threat groups targeted organizations for espionage, and Shamoon wiper malware re-emerged. (more available)
Added: October 23, 2018
image from 2017 Cybersecurity Threat Insights Report For Leaders

2017 Cybersecurity Threat Insights Report For Leaders

From the report, “When we set out to develop a report based on our 163 incident response client engagements over the course of the first half (H1) of 2016, we captured empirical data on type of threats, affected industries, and initial access vectors that threats use. (more available)
Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.
Added: October 22, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer. (more available)
Added: October 21, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.
Added: October 20, 2018
image from Offense-In-Depth: Reflective Social Engineering

Offense-In-Depth: Reflective Social Engineering

This report takes a look at phishing campaings and why they work so easily.
Added: October 19, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report September 2016

SecureWorks Threat Intelligence Executive Monthly Report September 2016

This report from September 2016 takes a look at Firewall VULNS, RIG Popularity, diversified ransomware, POS System attacks, and a few other specific threats. (more available)
Added: October 18, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.
Added: October 17, 2018
image from Widespread Outbreak Of NotPetya Ransomware

Widespread Outbreak Of NotPetya Ransomware

This report specifically talks about NotPetya.
Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report November 2016

SecureWorks Threat Intelligence Executive Monthly Report November 2016

This report from November 2016 takes a look at 6 different types of threat events and discusses the insights gleaned from research about those events. (more available)
Added: October 16, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 24, 2021 20:08 UTC (build 7e736b2)