Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

this report t explores the vulnerability-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers.

(more available)
Added: November 26, 2019
image from Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

A survey of over 300 security professionals on security operations center (SOC) practices and how those practices relate to outcomes.

(more available)
Added: November 25, 2019
image from 2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

A review of current maturity levels and practices as seen from Micro Focus’s five year history of reviewing security programs.

(more available)
Added: November 25, 2019
image from IT security economics in 2019

IT security economics in 2019

The Kaspersky Global Corporate IT Security Risks Survey (ITSRS) is a global survey of IT business decision makers, which is now in its ninth year. A total of 4,958 interviews were conducted across 23 countries. Respondents were asked about the state of IT security within their organizations, the types of threats they face and the costs they have to deal with when recovering from attacks. The regions covered consist of LATAM (Latin America), Europe, North America, APAC (Asia-Pacific with China), Japan, Russia and META (Middle East, Turkey and Africa).

(more available)
Added: November 25, 2019
image from Cloud Down Impact on the US Economy

Cloud Down Impact on the US Economy

The insurance industry has been asked by Lloyd’s, regulators, and its own senior management to understand its exposure to this type of cyber risk. To address this, AIR has developed a comprehensive database of industry exposures that provides the information insurers need for accurate modelling and has used it to form the basis of the alternative modelling approach described in this report. The results of this cloud downtime scenarios analysis could help insurance managers gain insights into how to grow their cyber business in a controlled and prudent manner.

(more available)
Added: November 25, 2019
image from 2019 Payment Security Report

2019 Payment Security Report

The PSR has the unique role of measuring the strengths and weaknesses of the PCI DSS and tracking the sustainability of compliance. It also measures and tracks challenges associated with implementing and maintaining security controls required for PCI DSS compliance.

(more available)
Added: November 25, 2019
image from Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

This 2019 edition of the SANS Security Operations Center (SOC) Survey was designed to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The goal is to capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and to highlight key areas on which SOC managers can focus to increase the effectiveness and efficiency of security operations.

(more available)
Added: October 1, 2019
image from Internet Risk Surface Report

Internet Risk Surface Report

This report goes in depth into the state of Internet security, including how companies are storing data, orgation’s internet surface areas, and where exposures exist the most.

(more available)
Added: October 1, 2019
image from Cloud Risk Surface Report

Cloud Risk Surface Report

This publication looks into the safety of cloud and on-prem environments.

Added: October 1, 2019
image from Fortinet Quarterly Threat Landscape Report Q2 2019

Fortinet Quarterly Threat Landscape Report Q2 2019

This is quarterly publication from Fortinet that looks in the current cyber security threats from April 1 to July 1.

(more available)
Added: October 1, 2019
image from Looking Beyond the Cluds

Looking Beyond the Cluds

A Guy Carpenter and CyberCube Analytics collaboration explores the size and shape of cyber catastrophes and the resulting financial impact on the U.S. cyber insurance industry.

(more available)
Added: September 25, 2019
image from Prioritization To Prediction Volume 4: Measuring What Matters in Remediation

Prioritization To Prediction Volume 4: Measuring What Matters in Remediation

This research was commissioned by Kenna Security. Kenna collected and provided the remediation dataset to the Cyentia Institute for independent analysis and drafting of this report.

(more available)
Added: September 18, 2019
image from Fake Executive Emails, Real Financial Losses

Fake Executive Emails, Real Financial Losses

From the report, “BEC is a specific type of phishing email that operates without links and without attachments (two of the standard markers that perimeter defenses look for). However, instead of taking over a computer or stealing data, BEC hackers impersonate an executive (a known CEO, CFO or other CxO), and persuade the recipient (an employee) to perform some action – like wiring money or attaching information to an email. " Read on to learn more.

(more available)
Added: September 18, 2019
image from The Changing Face of Data Security- 2019 Thales Data Threat Report

The Changing Face of Data Security- 2019 Thales Data Threat Report

This report focuses specifically on data threats in the healthcare industry.

Added: September 18, 2019
image from The Price Of Data Security

The Price Of Data Security

This paper discusses all of the consequences for GDPR non-compliance.

Added: September 18, 2019
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. That means that a user has a secret, and a centralized authority holds the same secret. When authenticating, those two secrets are compared to approve user access. If a malicious 3rd party intercepts the secret, they can impersonate the user. The bad news is that this reliance on shared secrets has kept large populations of users vulnerable to phishing, credential stuffing attacks, and password reuse while contributing to the steep rise in Account Take Over (ATO). The good news? The Digital Identity landscape is about to change very quickly.”

(more available)
Added: July 10, 2019
image from 10 Predictions for Developers in 2019

10 Predictions for Developers in 2019

This report provides exactly what its title offers, 10 predictions for developers in 2019.

Added: July 10, 2019
image from Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Risk IQ offers a glimpse into the multiple attacks on IT infrastructure organizations like Wipro and several others. This report is an analysis of those campaigns, their operators, and their targets.

(more available)
Added: July 10, 2019
image from Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

Healthcare's Legacy Infrastructure Of Unmanaged Devices Exposes A Vulnerable Attack Surface

This specialized report offers insights into the Healthcare industry and the gaps in policies and procedures that could lead to damaging cyber events within the industry.

(more available)
Added: May 18, 2019
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from The PSD2 Tracker: May 2019

The PSD2 Tracker: May 2019

This monthly report offers insights into the PDS2 regulations and news.

Added: May 18, 2019
  • ««
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)