Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Data breach

Below you will find reports with the tag of “Data breach”

image from Identity and Access Management: The Stakeholder Perspective

Identity and Access Management: The Stakeholder Perspective

This report aims to capture hard data on the experiences of stakeholders who are impacted by IAM processes and technologies, and the impact of current IAM practices on security risks and business operations. (more available)
Added: February 22, 2021
image from Securing Your Apps in the Borderless Cloud

Securing Your Apps in the Borderless Cloud

This report takes a look at the public cloud, adoption trends, security concerns, app vulnerabilities, and a variety of related issues faced with rapid cloud adoption. (more available)
Added: February 22, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from Cyber Security Team's Guide to Technology Decision Making

Cyber Security Team's Guide to Technology Decision Making

This report was created after a survey of more than 900 Senior IT security decision-makers. It looks at how they allocate finite resources in a way that best serves their organization. (more available)
Added: December 18, 2020
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. (more available)
Added: December 18, 2020
image from The Hidden Costs of Cybercrime

The Hidden Costs of Cybercrime

This report looks at the costs of cybercrime, money or otherwise, and the effect it has on selected sectors. It then gives recommendations for decision makers in order to prevent cybercrime. (more available)
Added: December 18, 2020
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers. (more available)
Added: December 18, 2020
image from 2020 State of Data Security Report- 10 Trends to Watch

2020 State of Data Security Report- 10 Trends to Watch

This report is based on a survey aimed at understanding how businesses keep information safe. They outline 10 data breach trends and how they have changed in 2020. (more available)
Added: December 16, 2020
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations. (more available)
Added: December 16, 2020
image from Market Analysis: Brave the New Normal

Market Analysis: Brave the New Normal

This report is a market analysis of companies in Asia-Pacific. It aims to look at new security challenges they face due to remote work. (more available)
Added: December 1, 2020
image from Cybersecurity Topics: How Employees Impact Cyber Defense

Cybersecurity Topics: How Employees Impact Cyber Defense

This survey looked at company security on the employee level, finding that many employees are not careful with their data.
Added: December 1, 2020
image from 2021 Data Risk Report: Financial Services

2021 Data Risk Report: Financial Services

This report focus on the data security of the financial industry: banking, insurance, and investments. It draws correlations between the current state of the security and the threats that are yet to come. (more available)
Added: November 30, 2020
image from The Great Cyber Surrender

The Great Cyber Surrender

This report looks at the scale and complexity of cyberattacks on individuals and firms. It then goes into what needs to be done to deal with the complex and evolving threat of cyber attacks. (more available)
Added: November 30, 2020
image from IRIS 20/20 Xtreme

IRIS 20/20 Xtreme

The IRIS 20/20 Xtreme is a follow-up to the IRIS 20/20 study earlier this year, this time focusing on the 100 largest cyber incidents of the last five years, totaling $18 billion in reported losses and 10 billion compromised records. (more available)
Added: November 10, 2020
image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.
Added: October 29, 2020
image from Protecting Data Privacy to Maintain Digital Trust

Protecting Data Privacy to Maintain Digital Trust

This study explores data privacy challenges for organizations that are trying to maintain digital trust with their customers, along with the evolving privacy landscape and its impact on consumers. (more available)
Added: October 25, 2020
image from Bulletproof Annual Cyber Security Report 2019

Bulletproof Annual Cyber Security Report 2019

Drawing from their managed SIEM, vulnerability scanning, and penetration testing services, this report reviews the key trends from the 2018 calendar year. (more available)
Added: October 19, 2020
image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.
Added: October 14, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more. (more available)
Added: October 14, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.
Added: October 11, 2020
image from 4th Annual Hacker Powered Security Report

4th Annual Hacker Powered Security Report

This report goes into the hacking industry in 2020. It talks about the impact of hackers on security, bug bounty trends, and more. (more available)
Added: October 8, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 29
  • »
  • »»
© Cyentia Institute 2021
Library updated: April 20, 2021 12:07 UTC (build f09024c)