Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from 2022 XDR Report

2022 XDR Report

Evolving security threats, exponential data growth, increased complexity, and a continuing cybersecurity shill shortage has given rise to a new category of security solutions called Extended Detection and Response (XDR). Red Piranha and Cybersecurity Insiders conducted a comprehensive survey to reveal the latest XDR trends and challenges in managing XDR, what XDR might replace, and how organizations select security technologies and providers.

(more available)
Added: July 5, 2022
image from SIEM Report 2022

SIEM Report 2022

The 2022 SIEM Report is based on a survey of 348 cybersecurity professionals and represents one of the industry’s most comprehensive annual studies on SIEM, exploring the latest trends, key challenges, and solution preferences in this market.

(more available)
Added: July 5, 2022
image from Insider Risk Report 2022

Insider Risk Report 2022

The 2022 Insider Risk Report is driven by real data observed as part of actual investigations of real customers with whom DTEX detected and responded to potential insider risk incidents before a breach occurred.

(more available)
Added: July 5, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from State of Threat Detection & Response

State of Threat Detection & Response

We wanted to gain insights into the experience of security teams who are at the helm of their organization’s detection and response operations and uncover more about what they experience each day. We surveyed over 400 security engineers and analysts to understand the current state of detection and response.

(more available)
Added: June 30, 2022
image from SANS 2022 Ransomeware Defense Report

SANS 2022 Ransomeware Defense Report

In this white-paper, we address both high-level concepts: With respect to ransomware, what are the current adversary trends, and then what can organizations do to defend themselves (or better defend themselves)? The basic concept of ransomeware remains the same: Encrypt data and demand money for decryption.

(more available)
Added: June 28, 2022
image from SANS 2022 Cloud Security Survey

SANS 2022 Cloud Security Survey

The goal of the SANS 2022 Cloud Security Survey is to provide additional insight into how organizations are using cloud today, the threats security teams are facing in the cloud, and what we are doing to improve security posture in the cloud, as well. This year, we again had several hundreds respondents, who represented a number of industries.

(more available)
Added: June 28, 2022
image from Ransomware Data Disclosure Trends

Ransomware Data Disclosure Trends

This report investigates the trends, pioneered by the Maze ransomware group, of double extortion. In particular, we examine the contents of initial data disclosures intended to coerce victims to pay ransoms. Rapid7 analysts investigated 161 separate data disclosures between April 2020 and February 2022 and identified a number of trends in the data.

(more available)
Added: June 16, 2022
image from Annual Data Exposure Report 2022

Annual Data Exposure Report 2022

Today, data is a company’s most valuable asset, leading many to invest in Insider Risk Management programs. Recent trends around employee turnover and remote work have created unprecedented challenges for security teams to protect valuable data from leaving the company. There needs to be most investments around educating the Broad, training employees, and increasing visibility to data movement.

(more available)
Added: June 8, 2022
image from The State of Password Security In The Enterprise

The State of Password Security In The Enterprise

A recent Authentication Security Strategy survey by Enzoic and Redmond magazine revealed insights into the way that passwords are currently being used in various organizations, and what the future looks like regarding this ubiquitous authentication method.

(more available)
Added: May 31, 2022
image from Data Breach Investigations Report 2022

Data Breach Investigations Report 2022

For this, our 15th anniversary installment, we continue in that same tradition by providing insight into what threats your organization is likely to face today, along with the occasional look back at previous reports and how the threat landscape has changed over the intervening years.

(more available)
Added: May 24, 2022
image from CrimeWare Report 2021: Post-Mortem Analysis of a Dumpster Fire

CrimeWare Report 2021: Post-Mortem Analysis of a Dumpster Fire

For many cybersecurity community, the past several months have been a dumpster fire. We’ve analyzed and tracked definitive data from more than 1,500 incident response and forensic cases over 12 months to provide unique visibility into the state of ransomware.

(more available)
Added: May 17, 2022
image from The 2021 Prevalent Third-Party Risk Management Study

The 2021 Prevalent Third-Party Risk Management Study

The goal of the study was to provide a state-of-the-market on third-party risk with actionable recommendations that organizations can take to grow and mature their programs across every stage of the third-party risk lifecycle.

(more available)
Added: May 16, 2022
image from The State of Pentesting 2019

The State of Pentesting 2019

The information included in this report is summary data from the pentesting performed in 2018. Additionally, we provide survey data from respondents in security, management, operations, DevOps, product, and developer roles.

(more available)
Added: May 16, 2022
image from M-Trends 2021

M-Trends 2021

As ransomware operators were attacking state and municipal networks alongside hospitals and schools, a global pandemic response to COVID-19 necessitated a move to remote work for a significant portion of the economy. Many security teams were forced to suspend wide-ranging analyses around the adoption of remote work policies and instead focus on a supply chair attack from a trusted platform.

(more available)
Added: April 28, 2022
image from M-Trends 2022

M-Trends 2022

M-Trends provides an inside look at the evolving cyber threat landscape directly from global incident response investigations and threat intelligence analysis of high-impact attacks and remediations around the globe.

(more available)
Added: April 28, 2022
image from Learning from Incident Response: 2021 Year in Review

Learning from Incident Response: 2021 Year in Review

Secureworks incident response (IR) engagements in 2021 revealed trends about threats and threat actor behaviors. Between January and December 2021, Secureworks incident responders assisted in the containment and remediation of over 450 security incidents.

(more available)
Added: April 26, 2022
image from Threat Intelligence Executive Report 2021 Vol. 6

Threat Intelligence Executive Report 2021 Vol. 6

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During September and October 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2021 Vol. 4

Threat Intelligence Executive Report 2021 Vol. 4

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 21, 2022
image from Threat Intelligence Executive Report 2021 Vol. 1

Threat Intelligence Executive Report 2021 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from Threat Intelligence Executive Report 2020 Vol. 5

Threat Intelligence Executive Report 2020 Vol. 5

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During July and August 2020, CTU researchers observed notable development in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 08:08 UTC (build b1d7be4)