Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Availability

Below you will find reports with the tag of “Availability”

image from The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

The Increased Risk Of Cyberattacks Against Manufacturing Organizations: 2018 Spotlight Report

This report offers insight into cyberattack behavior in the manufacturing industry. It discusses the severity of attacks, botnets, and other important issues related to the manufacturing industry.

(more available)
Added: February 7, 2019
image from Under The Hood Of Cyber Crime

Under The Hood Of Cyber Crime

From the report, “In the first installment of the 2019 Security Report ‘CyberAttack Trends Analysis’, we reviewed the latest trends and threats facing the IT security industry today. We assessed the major incidents that impacted organizations over the past year along with our commentary and insights regarding them. These trends fell into the categories of Cryptominers, Ransomware, Malware Methodology, Data Breaches, Mobile and Nation State Cyber Attacks. In this installment we zone in on an underlying trend that lies behind all of the above categories, the democratization of cyber crime.” Read on to find out more.

(more available)
Added: February 7, 2019
image from The State Of Cybersecurity At Financial Institutions

The State Of Cybersecurity At Financial Institutions

The survey upon which this report is based was fielded by the Financial Services Information Sharing and Analysis Center, in conjunction with Deloitte’s Cyber Risk Services practice. Fifty-one companies participated in the pilot launch of the survey, with representation from entities both larch and small, as well as those in between. Respondents came from all financial sectors, albeit skewed more heavily toward the US banking community.

(more available)
Added: February 7, 2019
image from H1 2018 Report: The State Of Online Journey Hijacking

H1 2018 Report: The State Of Online Journey Hijacking

Online Journey Hijacking, a client-side phenomenon where unauthorized ads are injected into consumer browsers, is a growing yet invisible problem for eCommerce sites. This issue is widespread across the web — yet the eCommerce industry has only been made aware of its existence in recent years.

(more available)
Added: February 6, 2019
image from Health Care Cyber Breach Research Report for 2016

Health Care Cyber Breach Research Report for 2016

This report offers insight into Cyber Breaches and the health industry for 2016. It provides information on the important trends of 2016, medical device hijacks and the top ten health care cyber attacks of 2016.

(more available)
Added: February 6, 2019
image from The Life of a Zero day

The Life of a Zero day

From the report, “We live in incredible times, where we trust more of our lives to machines that are becoming ever more powerful. We cannot leave the doors to our “digital kingdoms” wide open. Adversaries, both nation-states and for-profit malicious actors, have access to a seemingly unlimited supply of “all access keys”. Our responsibility is to revoke and disable these keys or to at least make that access as difficult as possible through thoughtful defense-in-depth security controls. These controls should not just rely solely on the “next gen” version of a well-known technology. Truly different types of protection and detection technologies need to be layered in order to create the strongest possible defense.” Read on to find out more.

(more available)
Added: February 6, 2019
image from Is Your Endpoint Security Strategy Too Negative?

Is Your Endpoint Security Strategy Too Negative?

From the report, “An OS-Centric Positive Security isn’t a silver bullet, but it can be a tremendously valuable and complementary defense mechanism—your second or last line of defense. The majority of endpoint security solutions deployed today are based on the Negative Security model; so, it’s time to add a Positive Security solution to strengthen your endpoint protection.” Read on to find out more.

(more available)
Added: February 6, 2019
image from MEDJACK.4 Medical Device Hijacking

MEDJACK.4 Medical Device Hijacking

This report takes an inside look at the Cyber Security challenge for healthcare today and more specifically looks at the medical device security challenge.

(more available)
Added: February 6, 2019
image from Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

Cisco Cybersecurity Series January 2019: Maximizing the value of your data privacy investments

The findings from this study provide strong evidence that organizations are benefitting from their privacy investments beyond compliance. Organizations that are ready for GDPR are experiencing shorter delays in their sales cycle related to customers’ data privacy concerns than those that are not ready for GDPR. GDPR-ready organizations have also experienced fewer data breaches, and when breaches have occurred, fewer records were impacted, and system downtime was shorter. As a result, the total cost of data breaches was less than what organizations not ready for GDPR experienced.

(more available)
Added: February 6, 2019
image from The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

The Anatomy of an Attack Surface: Five Ways Hackers are Cashing In

From the report, “For security teams, the sheer depth and breadth of what they need to defend may seem daunting, but thinking about the Internet from an attacker’s perspective —a collection of digital assets that are discoverable by hackers as they research their next campaigns— can put the massive scope of their organization’s attack surface into perspective. In this report, we’ll highlight five areas that we feel help to better frame the challenges faced in keeping the Internet a safe environment, all of which underline a need to broaden awareness of the potential risks involved to foster a more informed approach to cyber defense.”

(more available)
Added: February 6, 2019
image from 2018 eCommerce Holiday Season Data Recap

2018 eCommerce Holiday Season Data Recap

From the report, “As the dust settles after the 2018 holiday shopping season, online retailers and eCommerce businesses will be diving deep into the results to measure just how effectively their online promotional campaigns capitalized on the opportunity - and translated increased traffic into more revenue and improved conversion rates. Just what type of impact did the holiday season have on eCommerce brands in 2018? What days stood out amongst the pack when it came to traffic, orders, and conversion rates? Which verticals saw their KPIs rise the most? To uncover top holiday season eCommerce insights, Namogoo analyzed hundreds of millions of web sessions across regions, devices, and verticals.”

(more available)
Added: February 6, 2019
image from 2018 Healthcare Threat Report

2018 Healthcare Threat Report

From this one page report, “Healthcare organizations possess some of the most valuable information exchanged on the black market, including social security numbers, patient records, financial information and intellectual property. To help you understand the common attack types and trends facing the healthcare industry, we’ve compiled the following observations based on real data from across our client base.”

(more available)
Added: February 5, 2019
image from Assault On Healthcare

Assault On Healthcare

This report offers some insight into Health Information Technology and the cybersecurity issues that plague that area.

Added: February 5, 2019
image from Will EU Regulation Aid Cyber Criminals?

Will EU Regulation Aid Cyber Criminals?

From the report, “During the last few months, global corporations have been extremely busy with implementing the needed changes in order to be compliant with the upcoming GDPR regulation. While this happens, cyber-threat actors are preparing themselves for the possible consequences, without a clear picture of whether GDPR will hurt them or benefit them. According to the General Data Protection Regulation (GDPR) any company that handles European Union consumer personal data is obligated to take tangible steps to ensure the information’s security. This means the EU sees any organization that uses EU citizens’ data of any kind, responsible to protect it, whether the organization is headquartered inside EU territory or not. It will, of course, affect the way global corporations handle consumer data encryption, but in even more basic terms, it will affect what kind of information is permitted to be stored and passed along to other users.”

(more available)
Added: January 31, 2019
image from UK Active Cyber Defence

UK Active Cyber Defence

The key findings of this report are; 1) Active Cyber defence has significant potential in helping improve UK national cybersecurity 2) Active Cyber defence can play a powerful role in shaping the cybersecurity marketplace and furthering the interests of UK internet users and consumers 3) Active Cyber defense is a potentially useful model for export to like-minded countries 4) Active Cyber defense may constitute an emergent public good 5)Active cyber defense is not perfect, nor should we expect it to be.

(more available)
Added: January 31, 2019
image from State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

The report covers a variety of issues but offers these key findings, Sometimes an “attack” isn’t exactly what it first appears to be, Bots are big money for attackers and they’re constantly evolving, Mental health issues cost U.S. businesses more than $190 billion a year in lost earnings. Read on for more information.

(more available)
Added: January 31, 2019
image from EMA Radar for Digital Threat Intelligence Management: Q4 2017

EMA Radar for Digital Threat Intelligence Management: Q4 2017

This report offers insight into digital threat intelligence management.

Added: January 31, 2019
image from 2018 Webroot Threat Report: Mid-Year Update

2018 Webroot Threat Report: Mid-Year Update

The Webroot Threat Research Team has analyzed the data from our customer base during the first half of 2018. This mid-year threat report not only shows the stats, but also tells the story behind the headlines. The bottom line from our observations: it has never been more important to implement a robust, effective, multi-layered and continuously evolving security approach to keep valuable data and systems secure.

(more available)
Added: January 31, 2019
image from State of DevOps:Market Segmentation Report

State of DevOps:Market Segmentation Report

From the report, “For the past six years, Puppet has produced the annual State of DevOps Report1 and collected more than 27,000 responses from technical professionals around the world, making it the longest-running and most comprehensive study on the topic of DevOps today. One of the most common requests we’ve gotten over the years is for segmentation of the data by region, industry and company size. In this special report, we’ve segmented the 2017 State of DevOps survey data to dive deeper into trends and patterns we’re seeing in each of these segments.”

(more available)
Added: January 24, 2019
image from Cyber Attack Trends Analysis

Cyber Attack Trends Analysis

From the report, “With data drawn from our ThreatCloud World Cyber Threat Map and our experience within the cyber research community, we will give a comprehensive overview of the trends observed in the categories of Cryptominers, Ransomware, Malware techniques, Data Breaches, Mobile and Nation State cyber attacks. We will then conclude with a review of the predictions made in our 2018 Security Report and assess to what extent these proved accurate. Along the way we will also provide cutting edge analysis from our in-house experts to arrive at a better understanding of today’s threat landscape.”

(more available)
Added: January 24, 2019
image from State of Application Services 2019 Report

State of Application Services 2019 Report

From the report, “For our fifth annual survey, we asked nearly 2,000 respondents globally across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. This survey provides a uniquely comprehensive analysis of the trends shaping the application landscape—and how IT organizations are transforming to meet the ever-changing demands of the digital economy.”

(more available)
Added: January 17, 2019
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)