Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Webroot

Below you will find reports with the source of “Webroot”

image from 2021 Webroot BrightCloud Threat Report

2021 Webroot BrightCloud Threat Report

The threat intelligence, trends and details presented in the 2021 Webroot BrightCloud Threat Report are based on data continuously and automatically captured by the Webroot Platform, which is the proprietary machine learning-based architecture that powers all of our Webroot protection and BrightCloud services. (more available)
Added: April 25, 2022
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. (more available)
Added: December 18, 2020
image from Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

It’s clear from these findings that there is still a lot of confusion around artificial intelligence and machine learning, especially in terms of these technologies’ in business cybersecurity. (more available)
Added: May 18, 2020
image from Hook, Line, and Sinker- Why Phishing Attacks Work

Hook, Line, and Sinker- Why Phishing Attacks Work

In this report, we’ll dig deeper into the survey results and present our own understanding of these statistics, as well as analysis from Dr. (more available)
Added: May 11, 2020
image from Assessing "Cyber Hygiene" in the U.S.

Assessing "Cyber Hygiene" in the U.S.

Wakefield Research partnered with Webroot to conduct an online quantitative research study among U.S. consumers to: Better understand attitudes, perspectives, and behaviors related to cyber hygiene Based on this data, create a risk index (“Cyber Hygiene Risk Index”) to assess the risks associated with susceptibility to cybercrime in each state, ranking the states to determine the riskiest and least risky states in the U. (more available)
Added: May 11, 2020
image from The Future Of Cybercrime & Security

The Future Of Cybercrime & Security

This report offers insight into both Cybercrime and Cybersecurity. It discusses IoT botnets and DDoS, Rising Ransomware, File-less Attacks, and on the security side, it discusses Talent 7 Budget Shortage, Government opinions, Pervasive Threat Intelligence and Market Consolidation. (more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report

2018 Webroot Threat Report

The 2018 edition of Webroot’s annual Threat Report shares a glimpse into their discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime. (more available)
Added: January 31, 2019
image from 2018 Webroot Threat Report: Mid-Year Update

2018 Webroot Threat Report: Mid-Year Update

The Webroot Threat Research Team has analyzed the data from our customer base during the first half of 2018. This mid-year threat report not only shows the stats, but also tells the story behind the headlines. (more available)
Added: January 31, 2019
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year. (more available)
Added: October 14, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? (more available)
Added: October 13, 2018
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)