Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.

Added: October 14, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more.

(more available)
Added: October 14, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.

Added: October 11, 2020
image from 4th Annual Hacker Powered Security Report

4th Annual Hacker Powered Security Report

This report goes into the hacking industry in 2020. It talks about the impact of hackers on security, bug bounty trends, and more.

(more available)
Added: October 8, 2020
image from 2020 SMB IT Security Report

2020 SMB IT Security Report

This report focuses on cybersecurity for small and medium sized businesses for 2020. It goes over how cyber attacks have changed, how remote work has an effect, and more.

(more available)
Added: October 7, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies.

(more available)
Added: September 27, 2020
image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
image from 2020 Cyber Risk Outlook

2020 Cyber Risk Outlook

A survey of 1,000 insurance professionals and risk managers from 56 countries on their beliefs on the impact of COVID-19 and cyber exposure.

(more available)
Added: September 24, 2020
image from State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

Using Akamai’s global visibility and content delivery networks, this report covers the security threats present in the gaming industry. An exploration of how gamers are a growing lucrative target for criminals, including methods, geography, and recommendations.

(more available)
Added: September 23, 2020
image from 2020 Application Security Observability Report

2020 Application Security Observability Report

A report from aggregate telemetry on Contrast Security customers’ applications between June 2019 and May 2020. Covers application vulnerability prevalence, time to remediation, attacks, and composition, among other themes.

(more available)
Added: September 16, 2020
image from Understand the Mistakes that Compromise your Company's Cybersecurity

Understand the Mistakes that Compromise your Company's Cybersecurity

Tessian’s research reveals how distraction, stress and fatigue influence people’s ability to consistently make good cybersecurity decisions, and how the events of 2020 have highlighted why now - more than ever - businesses need to protect their employees.

(more available)
Added: September 8, 2020
image from H2 2020 Email Fraud & Identity Deception Trends

H2 2020 Email Fraud & Identity Deception Trends

This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020.

(more available)
Added: September 2, 2020
image from Cybersecurity: Building Business Resilience

Cybersecurity: Building Business Resilience

Robert Walters and VacancySoft have partnered together to analyse the UK cybersecurity hiring market, exploring the key trends that havemaintained job growth throughout 2020, and the key skills areas where we’ll see demand thrive as the decade progresses.

(more available)
Added: September 2, 2020
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies.

(more available)
Added: August 21, 2020
image from The state of vulnerability management in the cloud and on-premises

The state of vulnerability management in the cloud and on-premises

A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security.

(more available)
Added: August 18, 2020
image from Implementing Cloud Security Best Practices

Implementing Cloud Security Best Practices

This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey.

(more available)
Added: August 17, 2020
image from The CISO Current Report, Q2 2020

The CISO Current Report, Q2 2020

This paper compiles observations as well as predictions on the state of cybersecurity in 2020.

Added: August 17, 2020
image from 2020 Mid Year Report

2020 Mid Year Report

This mid year report covers publicly disclosed data breaches first reported between January 1, 2020 and June 30, 2020 and compares current observations to the same time period for prior years.

(more available)
Added: August 17, 2020
image from The 2020 Healthcare Cybersecurity Report

The 2020 Healthcare Cybersecurity Report

This report outlines changes in healthcare cybersecurity in 2019 as well as changes predicted to happen in 2020.

Added: July 30, 2020
image from Cost of a Data Breach Report 2020

Cost of a Data Breach Report 2020

The 2020 update of this survey-based review of the costs of a data breach, as reported by practitioners in the field.

(more available)
Added: July 30, 2020
image from The State of K-12 Cybersecurity: 2019 Year in Review

The State of K-12 Cybersecurity: 2019 Year in Review

Using publicly available breach information, this report seeks to analyze the breaches and incidents occurring in the US K-12 educational sector.

(more available)
Added: July 22, 2020
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 24, 2025 00:08 UTC (build b1d7be4)