Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Ripples Across the Risk Surface: 2021

Ripples Across the Risk Surface: 2021

A continued look at “ripple events” - multi-party security events - examining the size and frequency of these events, firmographics, as well as the velocity of spread of such events.

(more available)
Added: September 21, 2021
image from Netscout Threat Intelligence Report: 2H 2020

Netscout Threat Intelligence Report: 2H 2020

Netscout’s regular threat intelligence report. Focusing on the trends seen in denial of service (DOS) attacks across the Netscout control ecosystem.

(more available)
Added: May 2, 2021
image from The Impact of the Solarwinds Breach on Cybersecurity

The Impact of the Solarwinds Breach on Cybersecurity

A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise.

(more available)
Added: March 14, 2021
image from Aon's E&O | Cyber Insurance Snapshot

Aon's E&O | Cyber Insurance Snapshot

A review of current trends in the cyber insurance space, including key threat trends, claim frequency, severity, and pricing factors.

(more available)
Added: March 8, 2021
image from How IT Security Leaders Can Unlock the Potential of Their Teams

How IT Security Leaders Can Unlock the Potential of Their Teams

This report looks at IT security teams. They highlight changes in the teams and the ways that they work.

Added: February 28, 2021
image from The State of Stalkerware in 2020

The State of Stalkerware in 2020

This report aims to examine the issue of stalkerware. They present data to understand the changes and scale of the problem in 2020.

(more available)
Added: February 28, 2021
image from Aptum Cloud Impact Study Part 1: Bridging the Cloud Transformation Gap

Aptum Cloud Impact Study Part 1: Bridging the Cloud Transformation Gap

Part 1 of the Cloud Impact Study reveals that businesses understand the importance of the cloud and strive to adopt this model. It goes into several key barriers stopping businesses from utilizing the cloud’s potential.

(more available)
Added: February 22, 2021
image from Cloud Impact Study Part 2: The Security and Compliance Barricade

Cloud Impact Study Part 2: The Security and Compliance Barricade

Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. This report explores how cloud computing can bolster the overall security of an organization, but as deployments become more complicated, so too does data governance and security.

(more available)
Added: February 22, 2021
image from Internt of Tip-offs (IoT)

Internt of Tip-offs (IoT)

An analysis on the indicators to be derived from detecting Internet of Things (IoT) in organization’s public internet facing profiles.

(more available)
Added: January 26, 2021
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations.

(more available)
Added: December 16, 2020
image from Internet Risk Surface in the Financial Sector

Internet Risk Surface in the Financial Sector

A deep dive into the nature of the finance sector’s public risk surface. Reviewing subsectors of the finance ecosystem, including supply chains.

(more available)
Added: December 9, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

Added: December 1, 2020
image from Internet Risk Surface in the Healthcare Sector

Internet Risk Surface in the Healthcare Sector

A deep dive into the nature of the healthcare sector’s public risk surface. Reviewing subsectors of the healthcare ecosystem, including supply chains.

(more available)
Added: October 15, 2020
image from Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

This study captures and analyzes a large set of information about phishing attacks, in order to better understand how much phishing is taking place, where it is taking place, and to see if the data suggests better ways to fight phishing.

(more available)
Added: October 14, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.

Added: October 11, 2020
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.

Added: September 16, 2020
image from DDoS Threat Report Q3 2019

DDoS Threat Report Q3 2019

This report takes a look at the DDoS threats that occurred in the third quarter of 2019.

Added: September 16, 2020
image from More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

More Evidence of APT Hackers-for-Hire Used for Industrial Espionage

Bitdefender researchers recently investigated a sophisticated APT-style cyberespionage attack targeting aninternational architectural and video production company, pointing to an advanced threat actor and a South Korean based C&C infrastructure. This report goes in-depth on this attack.

(more available)
Added: September 1, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from 2019 Paid Ransomware Report

2019 Paid Ransomware Report

A review of 63 events where Kivu participated in payouts of ransomware events on behalf of clients engaged via a post-incident response. Provides firmographic breakdown of ransomware payouts.

(more available)
Added: July 27, 2020
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)