Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Data Breach

Below you will find reports with the tag of “Data Breach”

image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
image from ThreatMetrix Cybercrime Report

ThreatMetrix Cybercrime Report

The ThreatMetrix Payment Processor Cybercrime Report is based on actual cybercrime attacks last year that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Gaming & Gambling Report

Q2 2018 Gaming & Gambling Report

The ThreatMetrix Gaming and Gambling Cybercrime Report is based on actual cybercrime attacks in Q2 2018 that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report 2017: A Year In Review

Cybercrime Report 2017: A Year In Review

This report offers insight into the cybercrime events of 2017.

Added: January 30, 2019
image from 2017 Gaming and Gambling Cybercrime Report

2017 Gaming and Gambling Cybercrime Report

This report offers these key insights: 49% of all transactions analyzed in gaming and gambling come from a mobile device, Identity spoofing remains the biggest threat to the industry, and Automated bot attacks can account for around half of daily gaming/gambling traffic during periods of peak attacks.

(more available)
Added: January 30, 2019
image from Q3 2016 CyberCrime Report

Q3 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q3 2016 is based on actual cybercrime attacks from July 2016 – September 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q3 2016 Cybercrime Report APAC DeepDive

Q3 2016 Cybercrime Report APAC DeepDive

APAC continues to be an exciting region of huge growth, evolution and change; increasing its vulnerability to organized, global cyber attacks. This is particularly true given APAC has a particularly strong cross-border footprint, with a high proportion of digital transactions criss-crossing country boundaries. Cross-border transactions are considered riskier by most organizations, driven by the fact that they are far more likely to be automated bot attacks than domestic transactions, and attract higher instances of location spoofing, as fraudsters attempt to hide behind VPNs and proxies to mask their true location.

(more available)
Added: January 30, 2019
image from Q2 2016 Cybercrime Report: Europe Deepdive

Q2 2016 Cybercrime Report: Europe Deepdive

This report from ThreatMetrix compiles the data from their 2016 Cybercrime report to provide insight into the threats in the European sector.

(more available)
Added: January 30, 2019
image from 2017 Holiday Shopping

2017 Holiday Shopping

This report offers insight into global threats that occur during the Holiday shopping season.

Added: January 30, 2019
image from The State of Enterprise Encryption and How to Improve It

The State of Enterprise Encryption and How to Improve It

A new survey by UBM and Vera Security explores the use of encryption and access controls to understand how organizations currently use these technologies and to identify their top priorities in file security. The results of this research establish the reasons why encryption isn’t more widely used and considers how organizations can use this technology effectively to ensure the protection of their data.

(more available)
Added: January 17, 2019
image from Asssessing the DNS Security Risk

Asssessing the DNS Security Risk

Ponemon Institute is pleased to present the findings of Assessing the DNS Security Risk, sponsored by Infoblox. The purpose of this study is to understand the ability of organizations to assess and mitigate DNS risks. As part of the research, an online index has been created to provide a global measure of organizations’ exposure to DNS security risks and assist them in their response to DNS security risks.

(more available)
Added: January 15, 2019
image from Cyber Pulse:The State of Cybersecurity in Healthcare

Cyber Pulse:The State of Cybersecurity in Healthcare

To gain insight into what’s happening in the healthcare industry when it comes to cybersecurity, Kaspersky Lab issued a survey. The research provides insight into the perceptions of healthcare employees in North America regarding cybersecurity in their workplace, including awareness of cybersecurity breaches, protection of sensitive information, cybersecurity awareness and training, and more. Kaspersky Lab commissioned the research firm Opinion Matters to conduct a survey of 1,758 employees based in healthcare organizations in the United States and Canada. Through this research, the company aims to create a dialogue among businesses and IT staff in healthcare about the current state of awareness of cybersecurity among their employees, along with providing suggested proactive steps that can be taken to prioritize cybersecurity awareness through trainings and consistent education, aiming to prevent or minimize the next cybersecurity issue.

(more available)
Added: January 15, 2019
image from Definitive Guide To Azure Security

Definitive Guide To Azure Security

While popular out-of-the-box SaaS products like Salesforce, Box, Dropbox, and Office 365 are becoming common in the workplace, many enterprises have business needs that require custom-made applications.

(more available)
Added: January 15, 2019
image from A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

A House Divided: The Cost of Dysfunction Between Network & Cybersecurity Teams

From the Report, “A new study by IDG shows 86% of organizations have suffered repercussions, including increased security breaches and data loss, due to lack of collaboration between Network & Cybersecurity teams.”

(more available)
Added: January 15, 2019
image from Indicators of Attack Versus Indicators of Compromise

Indicators of Attack Versus Indicators of Compromise

Based on extensive use of CrowdStrike’s next generation endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike’s in house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information security procedures while avoiding common mistakes and pitfalls.

(more available)
Added: January 1, 2019
image from Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

This report offers a checklist for surviving a Cyber Attack.

Added: January 1, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. How should organizations on both sides approach the process? Steve Chabinsky of CrowdStrike shares his thoughts on strategy for assessing cyber risk during the M&A due diligence process.

(more available)
Added: January 1, 2019
image from Why Managed Threat Hunting?

Why Managed Threat Hunting?

This report offers insight into threat hunting. It specifically focusses on the “Human Detection Engine.”

Added: January 1, 2019
image from Hacking, Escalating Attacks And The Role Of Threat Hunting

Hacking, Escalating Attacks And The Role Of Threat Hunting

This research was conducted to understand the challenges and issues facing UK businesses right now in their fight against cybercrime including hacking, malicious attacks, and breaches, and to scope how organisations are using threat hunting to strengthen their defences.

(more available)
Added: January 1, 2019
image from Telstra Security Report 2018

Telstra Security Report 2018

This report offers an analysis of may of the significant cyber security events of 2017.

Added: January 1, 2019
image from Missing Critical Patches: A Cybersecurity Epidemic

Missing Critical Patches: A Cybersecurity Epidemic

From the report, “IT security leaders know their companies’ endpoints, PCs, and servers are continuously targeted by hackers. They also agree following best practices in endpoint security hygiene is instrumental in reducing cyber incidents. However, our 2017 survey of IT security leaders points to a situation where most are concerned about their actual practices in endpoint security hygiene. Fortunately, most also acknowledge they need to improve. When it comes to identifying their top priorities, IT security leaders are clear: they want to reduce the frequency and severity of data breaches; streamline regulatory compliance; and maintain business continuity. When it comes to identifying and executing upon the security hygiene best practices required to deliver on these priorities, things begin to get murky. Our 2017 survey of IT security leaders reveals a situation in which most respondents express concern about their security hygiene practices and waning confidence in the ability of existing tools to help them improve. Read on for more about what we learned, plus five recommended action items you can take today to address these issues.”

(more available)
Added: December 29, 2018
  • ««
  • «
  • 17
  • 18
  • 19
  • 20
  • 21
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 22, 2025 04:08 UTC (build b1d7be4)