Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Confidentiality

Below you will find reports with the tag of “Confidentiality”

image from Cyber Bank Heists: Threats to the financial sector

Cyber Bank Heists: Threats to the financial sector

This annual report sheds light on the cybersecurity threats facing the financial sector. The report provides cyber ground truth, specifically manifesting an eye-opening perspective on the changing behavior of cybercriminal cartels and the defensive shift of the financial sector. In this year’s report, financial sector security leaders from around the world revealed during a series of interviews the type of attacks they’re currently seeing, what threats they’re most concerned about and how they’re adjusting their security strategy.

(more available)
Added: February 21, 2023
image from 2023 Cybersecurity Risk Report

2023 Cybersecurity Risk Report

The RiskLens Cybersecurity Risk Report is designed to provide references estimate for the probability, loss, and loss exposure of common cyber events. It summarizes the findings by industry and event themes, and details how actionable variables, such as security stance and data retention management, can reduce risk exposure.

(more available)
Added: February 21, 2023
image from Disrupting Initial Access

Disrupting Initial Access

This report summarizes the ever-changing TTPs leveraged to achieve Initial Access from security incidents thwarted by eSentire’s 24/7 SOC Analysts over a two-year period between April 2020 to April 2022. Experts from out TRU team have summarized an analysis of Initial Access trends and presented recommendations on how your organization can precent attackers from establishing initial footholds and deploying malware.

(more available)
Added: February 14, 2023
image from Gaming Cyber Threats

Gaming Cyber Threats

Intel 471 can help your organization defend against a wide variety of cyber threats by providing deep insights and comprehensive expertise into cybercriminal actors and related activity. This report provides a brief exploration of our unique insight into the cyber underground, highlighting how we can proactively help you stay ahead of the curve, enabling you to fight cybercrime and win.

(more available)
Added: February 9, 2023
image from UK Cyber Threats

UK Cyber Threats

This report provides a strategic-level overview of threats identified impacting the U.K. and U.K. based businesses, including ransomware and initial access brokers (IABs). as well as common threat actors tactics, techniques and procedures (TTPs) observed.

(more available)
Added: February 9, 2023
image from 2023 Insider Threat Report

2023 Insider Threat Report

The 2023 Insider Threat Report surveyed over 326 cybersecurity professionals to reveal the latest trends and challenges facing organizations in this changing environment. The report explores their critical data and IT infrastructure. New report from Cybersecurity Insiders and Gurucul shows growing risk from insider from insider attacks as they become more frequent and more difficult to detect, raising concern by security pros.

(more available)
Added: January 27, 2023
image from Energy Sector Threat Trends Report 2022

Energy Sector Threat Trends Report 2022

The global energy sector is facing a time of uncertainly due to a confluence of geopolitical, economic, and environmental factors. In tandem, the cyber threat landscape is growing increasingly complex, further complicating the picture for global energy suppliers. While governments and regulatory bodies urge the critical infrastructure sector to double down on cyber defense.

(more available)
Added: January 18, 2023
image from 2022 Securonix Threat Report

2022 Securonix Threat Report

The 2022 Securonix Threat Report highlights the trends, required data, and detection summaries for key trends. Additionally, our report covers the techniques we’ve seen from the trenches across insider threat, cloud infrastructure misuse/abuse, and preemptive ransomware detection. Finally, we added a new section in this report covering loT/OT.

(more available)
Added: January 11, 2023
image from IRIS Tsunami

IRIS Tsunami

We identified 50 of the largest multi-party cyber incidents over the past several years in an effort to understand their causes and consequences from beginning to end. Tsunami draws from the same rigorous methodology in the rest of the IRIS series. We started with a huge dataset of cyber loss events, identified those that involved multiple organizations, and then researched each event to understand who was behind it, what happened, how the after effects propagated through the supply chain, and the financial losses for all parties involved.

(more available)
Added: January 9, 2023
image from 2021 Trends In Identity

2021 Trends In Identity

The Trends in Identity Report that looks at the wide range of identity crimes committed against individuals as reported by the victims of those crimes. You’ll learn first-hand of the identity scams we see and how criminals convince people to willingly share information they know should be protected.

(more available)
Added: January 4, 2023
image from 2022 Business Impact Report

2022 Business Impact Report

Our 2022 Business Impact Report looks into what happens specifically to small businesses and solopreneurs following a data or security breach. For the report, the ITRC surveyed 447 small business owners, leaders, and employees to paint a picture of small organizations and individuals that are significantly impacted by cybercrimes, often multiple times in a short period of time.

(more available)
Added: January 4, 2023
image from Intelligence-Powered Security Operations

Intelligence-Powered Security Operations

In Intelligence-Powered Security Operations, risk and threat intelligence is combined with human expertise and machine power to deliver better outcomes to the business as a while. Ultimately, intelligence-powered security operations programs will deliver smarter security and better results.

(more available)
Added: December 22, 2022
image from Deepwatch SecOps Pulse Survey Q4 2022

Deepwatch SecOps Pulse Survey Q4 2022

The Deepwatch SecOps Pulse Survey research shows that security teams are more focused on improving response capabilities over detection improvements. This speaks to rising threats and an expanding attack surface that makes attacks nearly inevitable, forcing teams to prioritize limited resources.

(more available)
Added: December 22, 2022
image from 2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

This year’s report starts with a close look at OverWatch’s extensive dataset covering observed interactive threat actor behaviors, which we will refer to in this report as “intrusion activity.” It uses this data to examine how and where adversaries are operating to provide a comprehensive overview of the threat landscape.

(more available)
Added: December 20, 2022
image from Cyber Insurance Research Report

Cyber Insurance Research Report

Our hope is the results of the survey report and our expert analysis helps you prepare for obtaining and renewing cyber insurance, with coverage and rates that accurately reflect your risk profile.

(more available)
Added: December 9, 2022
image from Financial Trend Analysis

Financial Trend Analysis

The information in this report is based on ransomware-related information obtained from analysis of BSA data, trade publications, and commercial reporting, as well as insights from law enforcement and other partners. Trends represented in this report illustrate financial institutions’ identification and reporting of ransomware events and may not reflect the actual dates associated with ransomware incidents.

(more available)
Added: November 2, 2022
image from Cyber Trends and Credit Risks

Cyber Trends and Credit Risks

This report underscores the challenge facing corporate, government and not-for-profit debt issuers: rising cybersecurity incidents, higher costs to combat them, and an imbalance in the executive and risk management experience needed to manage them properly. In an ever-more-connected world, the risk of systemic attacks resulting in damaging financial and repetitional consequences keeps increasing.

(more available)
Added: October 26, 2022
image from 2021 Insider Threat Report

2021 Insider Threat Report

The 2021 Insider Threat Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to protect their critical data and IT infrastructure better.

(more available)
Added: October 24, 2022
image from 2021 BYOD Security Report

2021 BYOD Security Report

The 2021 BYOD Security Report reveals these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with remote work and enterprise mobility.

(more available)
Added: October 24, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report reveals how organizations are responding to security threats in the cloud, and which tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud. Cloud security concerns remain high as the adoption of public cloud computing continues to surge in the wake of the pandemic and the resulting massive shift to remote work.

(more available)
Added: October 24, 2022
image from 2021 Cloud Security Report

2021 Cloud Security Report

The 2021 Cloud Security Report has been produced by Cybersecurity Insiders to explore how organizations are responding to the evolving security threats in the cloud and the continues shortfall of qualified security staff.

(more available)
Added: October 24, 2022
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 00:08 UTC (build b1d7be4)