Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from 10 in 10 Report 2020

10 in 10 Report 2020

This report looks at the 10 most impactful factors in cybersecurity success for the next decade.

Added: September 27, 2020
image from Threat Landscape for Industrial Automation Systems H1 2020

Threat Landscape for Industrial Automation Systems H1 2020

This report from Kaspersky explains changes in the threat landscape for industrial automation systems for the first half of 2020. It goes in detail on the variety of malware, the main threat sources, regional differences, and more.

(more available)
Added: September 25, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.

Added: September 25, 2020
image from DDoS Threat Report Q3 2019

DDoS Threat Report Q3 2019

This report takes a look at the DDoS threats that occurred in the third quarter of 2019.

Added: September 16, 2020
image from Cybercrime: COVID-19 Impact

Cybercrime: COVID-19 Impact

Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic.

(more available)
Added: September 3, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
image from The state of vulnerability management in the cloud and on-premises

The state of vulnerability management in the cloud and on-premises

A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security.

(more available)
Added: August 18, 2020
image from Global Cybersecurity Index 2017

Global Cybersecurity Index 2017

A survey driven review of 25 indicators via 157 questions spanning 193 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from Upstream Security's Global Automotive Cybersecurity Report 2020

Upstream Security's Global Automotive Cybersecurity Report 2020

This report highlights research into cyber-attack trends in the smart mobility ecosystem.

Added: July 31, 2020
image from The 2020 Healthcare Cybersecurity Report

The 2020 Healthcare Cybersecurity Report

This report outlines changes in healthcare cybersecurity in 2019 as well as changes predicted to happen in 2020.

Added: July 30, 2020
image from Simplify to Secure: Reduce complexity by integrating your security ecosystem

Simplify to Secure: Reduce complexity by integrating your security ecosystem

This report explains the findings of a study the did, showing that seeking the exact technology to solve your newest, most pressing security concern may actually be multiplying security gaps that slow you down instead of simplifying your security environment.

(more available)
Added: July 29, 2020
image from Identity and Access Management Report

Identity and Access Management Report

A review of community members opinions on their prioritization for identity access management systems, the challenges implementing these solutions, and the desired capabilities when selecting IAM technologies.

(more available)
Added: July 27, 2020
image from 2019 Paid Ransomware Report

2019 Paid Ransomware Report

A review of 63 events where Kivu participated in payouts of ransomware events on behalf of clients engaged via a post-incident response. Provides firmographic breakdown of ransomware payouts.

(more available)
Added: July 27, 2020
image from What Doxxing Victims Reveal About "Targeted Attacks"

What Doxxing Victims Reveal About "Targeted Attacks"

A review of doxxing related ransomware cases handled by Kivu Consulting in a post-breach role. Explores firmographics of the organizations involved in various variants of ransomware families.

(more available)
Added: July 27, 2020
image from 2020 Cybersecurity Outlook Report

2020 Cybersecurity Outlook Report

An annual report using Carbon Black’s data sets of the Carbon Black Cloud customer footprint, Carbon Black User Exchange, public samples, Carbon Black Endpoint Standard data, and internal sources. Leverages the ATT&CK framework to determine common tools-techniques-processess (TTPs).

(more available)
Added: July 22, 2020
image from Threat Intelligence Executive Report 2020 Vol. 2

Threat Intelligence Executive Report 2020 Vol. 2

The Threat Intelligence Executive Report by Secureworks analyzes security threats and aims to help organizations protect their systems. In the first two months of 2020, they identified 3 main trends: Lesser-known government-sponsored threat groups putting data at risk, Citrix vulnerability disclosure causing spikes in incidents, and ransomware operators leveraging risk of GDPR fines as a threat.

(more available)
Added: July 8, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents.

(more available)
Added: July 1, 2020
image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.

(more available)
Added: May 28, 2020
image from The State of Ransomware 2020

The State of Ransomware 2020

A survey, conducted by Vanson Bourne, of 5,000 IT managers on their experiences with ransomware. Discusses prevalence, spread, techniques, and impact.

(more available)
Added: May 22, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.

Added: May 21, 2020
image from Securing Smart Factories

Securing Smart Factories

A look at the unique threat and risk landscape of the manufacturing industry. Discussing the challenges brought about by Industry 4.0, and recommends measures and best practices for securely reaping the benefits of connected production. We also reiterate that securing the manufacturing industry requires regular risk assessments and a resilient cybersecurity framework that is able to detect, respond to, and protect against a variety of security holes.

(more available)
Added: May 18, 2020
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 12:08 UTC (build b1d7be4)