Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from 2025 OT/ICS Cybersecurity Report

2025 OT/ICS Cybersecurity Report

This year the report highlighted the increasingly complex threat landscape and the corresponding escalating pressure on defenders to enhance visibility into and resilience of OT/ICS networks Organizations with strong incident response capabilities, defensible architectures, secure remote access protocols, and robust network monitoring are far better positioned to reduce the risk of a successful attack on the enterprise OT even in this increasingly complex environment.

(more available)
Added: April 25, 2025
image from 2025 Outlook for Security and Telemetry Data

2025 Outlook for Security and Telemetry Data

In this report, we explore for you the emerging trends and predictions that shape the future of enterprise IT and Security. From the global implications of the cybercrime convention to the pitfalls of failed AI projects, the insights we offer will help you prepare for what’s ahead.

(more available)
Added: April 25, 2025
image from The CISO Report

The CISO Report

Business leaders’ bottom-line concerns often conflict with CISOs’ insistence on vital cybersecurity investments. The CISO-board relationship is deepening as they have more opportunities to engage on matters of cybersecurity and enterprise risk. CISOs’ regular presence in the boardroom and their counsel on enterprise risk will strengthen board confidence and alignment.

(more available)
Added: April 25, 2025
image from OT/IoT Cybersecurity Trends and Insights

OT/IoT Cybersecurity Trends and Insights

The Nozomi Networks Labs team delivers this semi-annual report to provide insights into how the world’s largest industrial organizations and critical infrastructure operators can protect themselves from these advanced threats. Our threat intelligence, enriched by indicators of compromise, threat actor profiles and vulnerability data from Mandiant, empowers customers to proactively defend their systems.

(more available)
Added: March 18, 2025
image from Global Incident Response Report 2025

Global Incident Response Report 2025

Threat actors are augmenting traditional ransomware and extortion with attacks designed to intentionally disrupt operations. Amid these trends, we’re also seeing a multi-pronged approach in attacks, as threat actors target multiple areas of the attack surface. In fact, 70% of the incidents Unit 42 responded to happened on three or more fronts, underscoring the need to protect endpoints, networks, cloud environments and the human factor in tandem. These incidents involved large organizations grappling with extortion, network intrusions, data theft, advanced persistent threats and more.

(more available)
Added: March 18, 2025
image from Dragos’s 2025 OT Cybersecurity Report

Dragos’s 2025 OT Cybersecurity Report

This year highlighted the increasingly complex threat landscape and the corresponding escalating pressure on defenders to enhance visibility into and resilience of OT/ICS networks. This focus on simplicity highlights a critical point for defenders: effective implementation of the SANS ICS 5 Critical Controls remains the best defense against OT targeting adversaries.

(more available)
Added: February 28, 2025
image from 2022 Third-Party Breach Report

2022 Third-Party Breach Report

Our goal at Black Kite is to make sure you gain awareness of what is most relevant in the threat landscape going into the new year. The focus remains on understanding emerging vulnerabilities seized by cybercriminals, as well as target industries falling victim to breaches, stemming from a lack of due diligence. We studied why certain industry sectors faced higher susceptibility to an attack, as well as the most vulnerable vendors to the initial breach themselves.

(more available)
Added: February 18, 2025
image from The Cost of a Data Breach Report

The Cost of a Data Breach Report

For this report, Black Kite Research decided to approach the cost of a data breach from a new angle, to build upon survey-based data in a comprehensive way. The first half of this report provides insight into the 2,400 analyzed data breaches. The second half, the cyber risk posture deep dive, covers a thorough analysis of the 1,700 organizations that are still online and in business today.

(more available)
Added: February 18, 2025
image from The State of CyberSecurity 2025

The State of CyberSecurity 2025

This report highlights the real-world impact of these changes, offering 2025 insights and recommendations from and for CISCOs. With over a decade of analysis, Check Point Research insights come from unparalleled data sources that no other company combines. By incorporating incident response, dark web, and open-source findings, we achieve visibility in over 170 countries to reveal global and regional trends.

(more available)
Added: February 12, 2025
image from Q3 2024 Threat Landscape Report

Q3 2024 Threat Landscape Report

Nuspire has witnessed shifting trends in the ransomware, dark web and exploit sections of our report. Our research revealed that ransomware extortion publications increased by 8%, Lumma Stealer fiercely reclaimed its top spot as the leading infostealer, and threat actors are focusing heavily on exploiting VPN technology.

(more available)
Added: February 1, 2025
image from Security Navigator 2025

Security Navigator 2025

This year, we also delve deeper into the threats facing critical infrastructure, particularly within Operational Technology and mobile networks. With increased connectivity and the adoption of IoT and 5G, these systems offer an expanded attack surface that calls for comprehensive, cross-functional defenses. Our goal is not only to adopt the latest technologies but to do so thoughtfully, balancing progress with caution to secure a safer digital world.

(more available)
Added: February 1, 2025
image from 2025 Cybersecurity Forecast

2025 Cybersecurity Forecast

In this report, they we anticipate malicious actors will continue their rapid adoption of AI-based tools to augment and assist their online operations across various phases of the attack lifecycle. We expect to see cyber espionage and cyber crime actors continue to leverage deepfakes for identity theft, fraud, and bypassing know-your-customer (KYC) security requirements. As AI capabilities become more widely available throughout 2025, enterprises will increasingly struggle to defend themselves against these more frequent and effective compromises.

(more available)
Added: January 23, 2025
image from Risk Decisions 360

Risk Decisions 360

This report Risk Decisions 360 Emerging Risks That Can Impede Sustainable Company Growth, is the result of extensive research and insights aimed at empowering businesses to make informed decisions in the face of new and evolving risks. We examine critical areas that pose significant potential threats to growth, including cybersecurity, technological advancements, financial volatility and operational disruptions, among others – as well as delve into how business executives and owners view the skills and investment required, and the effectiveness of insurance, in mitigating these risks.

(more available)
Added: January 16, 2025
image from Global Cybersecurity Outlook 2025

Global Cybersecurity Outlook 2025

The Global Cybersecurity Outlook 2025 report includes a deeper analysis of the most important drivers of complexity and provides valuable insights into the most pressing cyber challenges in the year ahead and their potential implications for executives. Of large organizations, 54% identified supply chain challenges as the biggest barrier to achieving cyber resilience.

(more available)
Added: January 16, 2025
image from Scanning the Horizon: How broadening our use of cybersecurity data can help users

Scanning the Horizon: How broadening our use of cybersecurity data can help users

This is the first published study in this field to include SPoF (Single Point of Failure) data, which highlights the dependencies a company has on third-party systems and services. This paper represents a snapshot of our ongoing work exploring what is a deep and highly complex dataset.

(more available)
Added: December 11, 2024
image from 2024 State of API Security

2024 State of API Security

The Salt Security State of API Security Report for this year has brought to light an urgent need for action, as the usage of APIs has skyrocketed and security breaches have become more commonplace. Organizations are now managing more APIs than ever before, with 66% of them managing over 100. As a result, there has been a staggering increase in API security breaches, with incidents more than doubling in the past year (37% of respondents experienced incidents).

(more available)
Added: November 25, 2024
image from The Total Economic Impact  Of 1Password Business

The Total Economic Impact Of 1Password Business

1Password Business is an encrypted password solution that provides users with secure access via autofill logins, autogenerated strong passwords, and vault features. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization. Forrester took a multistep approach to evaluate the impact that 1Password can have on an organization.

(more available)
Added: October 30, 2024
image from Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

Cisco has a unique vantage point when it comes to cybersecurity. We resolve an average of 715 billion daily DNS requests, we see more threats, more malware, and more attacks than any other security vendor in the world. This report looks at the top threats that exploited DNS for cyberattacks, as well as how DNSlayer security provides better accuracy and detection of malicious activity and compromised systems.

(more available)
Added: October 24, 2024
image from Scanning the Horizon: How broadening our use of cybersecurity data can help insurers

Scanning the Horizon: How broadening our use of cybersecurity data can help insurers

At Gallagher Re, we have been exploring this data’s vast potential for several years. This research has informed the development of a suite of proprietary tools and services aimed at supporting the (re)insurance community in realising the potential of cyber data to enhance underwriting and portfolio monitoring. Principal among these is TIDE, our portfolio quality and benchmarking tool.

(more available)
Added: October 24, 2024
image from Ensia Threat Landscape 2024

Ensia Threat Landscape 2024

Reporting over the course of 2023 and 2024, ETL highlights findings on the cybersecurity threat landscape during a yearlong geopolitical escalation. Throughout the latter part of 2023 and the initial half of 2024, there was a notable escalation in cybersecurity attacks, setting new benchmarks in both the variety and number of incidents, as well as their consequences.

(more available)
Added: October 15, 2024
image from Microsoft Vulnerabilities Report 2021

Microsoft Vulnerabilities Report 2021

In its 8th year, the Microsoft Vulnerabilities Report has proven to be a valuable asset for many organizations who wish to gain a holistic understanding of the evolving threat landscape. The report provides a 12-month, consolidated view and analysis of Microsoft Patch Tuesdays, as well as exclusive insights from some of the world’s top cybersecurity experts. This analysis not only reveals evolving vulnerability trends, but also identifies the Critical vulnerabilities that could be mitigated if admin rights were removed.

(more available)
Added: October 15, 2024
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 12:08 UTC (build b1d7be4)