Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Verizon

Below you will find reports with the source of “Verizon”

image from Data Breach Investigations Report 2022

Data Breach Investigations Report 2022

For this, our 15th anniversary installment, we continue in that same tradition by providing insight into what threats your organization is likely to face today, along with the occasional look back at previous reports and how the threat landscape has changed over the intervening years. (more available)
Added: May 24, 2022
image from Cyber-Espionage Report

Cyber-Espionage Report

This inaugural report covers seven years of data from the DBIR as well as additional Verizon information, providing an overview of the cyber-espionage landscape. (more available)
Added: July 30, 2021
image from 2021 Data Breach Investigations Report

2021 Data Breach Investigations Report

The annual Data Breach Investigations Report (DBIR) is the annual marque analysis of breach and incident information over the previous year. (more available)
Added: May 13, 2021
image from 2020 Data Breach Investigations Report

2020 Data Breach Investigations Report

Verizon’s 2020 edition of the keystone DBIR. Covering breaches and attack trends across the previous year.
Added: May 19, 2020
image from 2019 Payment Security Report

2019 Payment Security Report

The PSR has the unique role of measuring the strengths and weaknesses of the PCI DSS and tracking the sustainability of compliance. (more available)
Added: November 25, 2019
image from Incident Preparedness and Response Report

Incident Preparedness and Response Report

The VIPR report (Verizon Incident Preparedness and Response Report) outlines preparations and responses to data breaches. This includes 6 phases, planning and preparation, detection and validation, containment and eradication, collection and analysis, remediation and recovery, and assessment and adjustment. (more available)
Added: October 1, 2019
image from Mobile Security Index 2019

Mobile Security Index 2019

It’s been another headline-grabbing 12 months for cybersecurity. There were many large and damaging compromises affecting retailers, airlines and credit rating companies, to name just a few. (more available)
Added: March 6, 2019
image from 2018 Data Breach Investigations Report

2018 Data Breach Investigations Report

Verizon’s annual report on data breaches in 2018
Added: October 26, 2018
image from 2016 Data Breach Investigations Report

2016 Data Breach Investigations Report

Verizon’s annual report on data breaches in 2016
Added: October 25, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it. (more available)
Added: October 24, 2018
image from 2015 PCI Compliance Report

2015 PCI Compliance Report

Subtitled “Insight for helping businesses manage risk through payment security”
Added: October 23, 2018
image from 2015 Data Breach Investigations Report

2015 Data Breach Investigations Report

Verizon’s annual report on all data breaches in 2015
Added: October 22, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. (more available)
Added: October 18, 2018
image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.
Added: October 17, 2018
image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.
Added: October 16, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. (more available)
Added: October 15, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.
Added: October 14, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time. (more available)
Added: October 13, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors. (more available)
Added: October 12, 2018
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)