Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Threat Intelligence Executive Report 2022 Vol. 1

Threat Intelligence Executive Report 2022 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from 2021 Global Threat Report

2021 Global Threat Report

This annual report offers important lessons and recommendations for security teams operating in today’s environment, where visibility and speed are more critical than ever.

(more available)
Added: April 19, 2022
image from 2022 Global Threat Report

2022 Global Threat Report

The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today’s threats in an increasingly ominous threat landscape.

(more available)
Added: April 19, 2022
image from 2022 Data Security Incident Response Report

2022 Data Security Incident Response Report

This is the Data Security Incident Response Report which features insight and metrics from the response to more than 1,250 incidents the firm helped client manage in 2020.

(more available)
Added: April 11, 2022
image from European Industrial Infrastructure Cyber Threat Perspective

European Industrial Infrastructure Cyber Threat Perspective

A review of the threat landscape (actors, actions, etc._ affecting industrial infrastructure in Europe.

Added: April 7, 2022
image from 2022 Threat Detection Report

2022 Threat Detection Report

This is the 2022 Red Canary Threat Detection Report. This report goes in-depth with over 30,000 confirmed threats detected across our customers environments, this research arms security leaders and their teams with actionable insight into the threats we observed, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why.

(more available)
Added: April 5, 2022
image from IRIS Risk Retina - Nonprofit

IRIS Risk Retina - Nonprofit

This free public report from the Cyentia IRIS Risk Retina series clears away the fog of FUD, providing parameters for frequency and loss of publicly discoverable cyberevents in the nonprofit sector.

(more available)
Added: March 21, 2022
image from The Size and Shape of Workforce Risk

The Size and Shape of Workforce Risk

A deep dive into the profiles of workforce members, identifying the characteristics of greater and less cyberrisk.

Added: March 9, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. In addition, the report offers perspectives on areas in which controls could be further improved and how money laundering techniques may evolve

(more available)
Added: January 26, 2022
image from Cyber Insurance: Changing Dynamics in a Maturing Market

Cyber Insurance: Changing Dynamics in a Maturing Market

In the face of non-stop cyber attacks affecting all firms large and small, the market has matured and skills levels have improved across the board. Importantly, insurers are paying back, but dynamics are changing and increasingly insurers are also demanding evidence of cyber robustness from their clients. The market is fast becoming less and less favorable to negligent buyers looking for silver bullets.

(more available)
Added: January 26, 2022
image from Cyber Security in Focus 2022

Cyber Security in Focus 2022

An annual state of the market report, which explores the views of a snapshot cohort of 55 security leaders on key themes, including; the skills shortage, barriers to strategy execution, the business perception of cyber security, and more.

(more available)
Added: January 20, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020.

(more available)
Added: January 13, 2022
image from Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

Hindsight Cybersecurity: Seven Key Lessons Learned By Breach Victims

This report shares seven key lessons learned by breach victims. Each lesson includes simple recommendations and tips, many of which do not require organizations to purchase any tools.

(more available)
Added: January 7, 2022
image from 2021 Cloud Application Security

2021 Cloud Application Security

As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever. But they also deliver significant risk, with Remote Desktop Protocol (RDP) alone serving as the vehicle of choice for as much as 55% of ransomware attacks. This report explores how cloud-based apps – from storage services to social media apps – threaten your network security.

(more available)
Added: December 10, 2021
image from Financial Trend Analysis: Ransomware Trends in Bank Secrecy Act Data Between January 2021 and June 2021

Financial Trend Analysis: Ransomware Trends in Bank Secrecy Act Data Between January 2021 and June 2021

Using governmental reports of bank secrecy act (BSA) data, this report evaluate the threat patterns and magnitudes in ransomware events over the first half of 2021. A historical view of trends in financial reports, both frequency and magnitudes, is included.

(more available)
Added: October 18, 2021
image from Trends in Cybersecurity Breaches: March 2021

Trends in Cybersecurity Breaches: March 2021

A survey of recent breaches occurring over the past year as identified and classified via AuditAnalytic’s commercial database of breach information. Include firmographic and case study information.

(more available)
Added: October 13, 2021
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.

(more available)
Added: October 5, 2021
image from Ripples Across the Risk Surface: 2021

Ripples Across the Risk Surface: 2021

A continued look at “ripple events” - multi-party security events - examining the size and frequency of these events, firmographics, as well as the velocity of spread of such events.

(more available)
Added: September 21, 2021
image from Cyber-Espionage Report

Cyber-Espionage Report

This inaugural report covers seven years of data from the DBIR as well as additional Verizon information, providing an overview of the cyber-espionage landscape. Attackers, motivations, methods, and victims are all focus areas.

(more available)
Added: July 30, 2021
image from Cost of a Data Breach Report 2021

Cost of a Data Breach Report 2021

The 17th edition of the Cost of a Data Breach report. Focuses on survey derived information to determine the cost of data breach incidents.

(more available)
Added: July 28, 2021
image from The State of the State of Application Exploits in Security Incidents

The State of the State of Application Exploits in Security Incidents

A meta-analysis of industry reports on the variety and forms of application exploits used in security incidents.

Added: July 22, 2021
  • ««
  • «
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 08:08 UTC (build b1d7be4)