Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Ericsson Mobility Report

Ericsson Mobility Report

By the end of 2022, 5G subscriptions are expected to reach 1 billion, and more smart 5G devices with additional capabilities are expected in the market during 2023. Our outlook for 2028 is that 5G subscriptions will pass 5 billion and Fixed Wireless Access (FWA) connections will reach 200 million, where 5G will account for almost 80 percent of FWA connections.

(more available)
Added: February 15, 2023
image from UK Cyber Threats

UK Cyber Threats

This report provides a strategic-level overview of threats identified impacting the U.K. and U.K. based businesses, including ransomware and initial access brokers (IABs). as well as common threat actors tactics, techniques and procedures (TTPs) observed.

(more available)
Added: February 9, 2023
image from 2022 Blackberry Threat Report Highlights

2022 Blackberry Threat Report Highlights

The cyber events of the past year included unprecedented supply chain attacks, assaults on critical infrastructure, and widespread vulnerabilities likely to haunt organizations for years. These events, among many others, are detailed in Blackberry 2022 Threat Report. However, reading the entire report can prove challenging for security professionals with little time to spare.

(more available)
Added: February 1, 2023
image from Close Encounters of the Third (and Fourth) Party Kind

Close Encounters of the Third (and Fourth) Party Kind

This report offers an in-depth examination of the underlying condition that enables such incidents to take place-the widespread interdependence of modern digital supply chains. We analyzed data from over 230,000 organizations to investigate the prevalence of security incidents among third parties. We then measure the extent of vendor relationships and explore the effects of that exposure. Finally, we compare the security posture of organizations to that of their third and fourth-parties to yield data-driven insights on how to identify risky vendors and better manage exposure.

(more available)
Added: February 1, 2023
image from 2023 Insider Threat Report

2023 Insider Threat Report

The 2023 Insider Threat Report surveyed over 326 cybersecurity professionals to reveal the latest trends and challenges facing organizations in this changing environment. The report explores their critical data and IT infrastructure. New report from Cybersecurity Insiders and Gurucul shows growing risk from insider from insider attacks as they become more frequent and more difficult to detect, raising concern by security pros.

(more available)
Added: January 27, 2023
image from 2023 Cybersecurity Status Report

2023 Cybersecurity Status Report

Ivanti surveyed over 6,500 executives leaders, cybersecurity professionals and office workers in October 2022. Our goal: to understand today’s threats - from the perspective of security professionals, as well as executive leaders and all other office workers - plus find out how companies are preparing for yet - unknown future threats.

(more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams.

(more available)
Added: January 11, 2023
image from The State of Dependency Management

The State of Dependency Management

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

(more available)
Added: December 20, 2022
image from Trust Services Security Incidents 2021

Trust Services Security Incidents 2021

This report, the Annual Report Trust Services Security Incidents 2021, analyzing root causes, statistics and trends. This report marks the sixth round of security incident reporting for the for the EU’s trust services sector. In this round of annual summary reporting a total of 27 EU countries and 3 EEA countries took part. They reported a total of 46 incidents.

(more available)
Added: November 9, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report reveals how organizations are responding to security threats in the cloud, and which tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. Cloud security concerns remain high as the adoption of public cloud computing continues to surge in the wake of the pandemic and the resulting massive shift to remote work.

(more available)
Added: October 24, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. This report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in 2022.

(more available)
Added: October 18, 2022
image from Enterprise Perspectives 2022

Enterprise Perspectives 2022

This research was conducted to understand the challenges, concerns, and perspectives of large enterprise organizations as they continue adapting their IT strategy and infrastructure to the rigors and risks of digital transformation and the hybrid work environment. It explores the investments organizations have already made to bolster infrastructure and security and those they are planning to make. It also examines expectations for remote and hybrid work as we enter a new phase of living with COVID-19.

(more available)
Added: October 17, 2022
image from 2022 AWS Cloud Security Report

2022 AWS Cloud Security Report

This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature.

(more available)
Added: October 12, 2022
image from DDoS Threat Report 2021 Q3

DDoS Threat Report 2021 Q3

Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY. Over 55% of attackers focused on hitting specific service with high volumes of traffic simultaneously. Due to the dramatic increase in attack size, this shift to employing high-penetration volumetric attacks can potentially lead to additional impact to CSP networks, regionally.

(more available)
Added: October 11, 2022
image from DDoS Threat Report FHY 2021

DDoS Threat Report FHY 2021

In the first half of 2021, we found that 99.09% of attacks were smaller than 10Gbps and 95.62% of attacks were smaller than 1Gbps, of which we believe a majority were launched using readily available and inexpensive DDoS-for-hire services.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q3

DDoS Threat Report 2020 Q3

In this edition of our quarterly report, there will be a special feature story that focuses on the DDoS issues surrounding the online gaming industry, in particular, why it is an industry to keep an eye on - especially the service providers to this industry. And why the popularity of online gaming has skyrocketed in Q3.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q2

DDoS Threat Report 2020 Q2

In this report, we’re going to discuss how bit-and-piece attacks have continued to evolve, and are able to successfully evade DDoS mitigation schemes when blended with multiple attack vectors, and the challenges that these advanced attack tactics present to the cybersecurity world.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2019 Q4

DDoS Threat Report 2019 Q4

In Q4 2019 an unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful.

(more available)
Added: October 11, 2022
image from DDoS Statistical Report 1HY 2022

DDoS Statistical Report 1HY 2022

In this report, the analysis conducted by our research team identifies vulnerabilities and measures attack trends worldwide to provide a comprehensive view of DDoS threats. Nexusguard is able to evaluate DDoS events in a manner that is not biased by any single set of customer or industries. Many zero-day threats are first seen on our global research network.

(more available)
Added: October 11, 2022
image from 2022 Imperva Bad Bot Report

2022 Imperva Bad Bot Report

This report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked data bot requests, anonymized over thousands of domains. The goal os this report is to provide meaningful information and guidance about the nature and impact of these automates threats.

(more available)
Added: October 10, 2022
image from 2022 State of the Internet Report

2022 State of the Internet Report

Censys maintains the most comprehensive view of assets on the Internet by continuously scanning the public IPv4 address space across the 3,500 most popular ports. This Internet-wide scan data also powers our Attack Surface Management (ASM) product, which comprehensively maps organizations’ Internet exposure. This data allows us to understand broader trends in Internet security and how organizations are exposed across the Internet.

(more available)
Added: October 10, 2022
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)