Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Database

Below you will find reports with the tag of “Database”

image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from 2020 Q3 Report: Vulnerability QuickView

2020 Q3 Report: Vulnerability QuickView

This report covers vulnerabilities disclosed this year. It aims to help the reader navigate the current vulnerability landscape. It provides valuable insight into vulnerability trends and how they are impacting organizations. (more available)
Added: December 16, 2020
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.
Added: November 21, 2020
image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.
Added: October 29, 2020
image from State of Software Security: Volume 11

State of Software Security: Volume 11

The 2020 edition of this annual report uses results of software scan patterns and results across thousands of global customers. A focus for this edition is the effects of nature (the corporate environment of applications) vs. (more available)
Added: October 27, 2020
image from SOTI/Security - Loyalty for Sale

SOTI/Security - Loyalty for Sale

This edition of the State of the Internet (SOTI)/Security report series focuses on the retail and hospitality sectors. An extensive review of how credential abuse attacks are carried out from both a methodology perspective and a volumetric angle is given. (more available)
Added: October 21, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.
Added: October 18, 2020
image from Looking Into the Eye of the Interplanetary Storm

Looking Into the Eye of the Interplanetary Storm

This article offers a glimpse into the inner workings of the Interplanetary Storm botnet, provides an exhaustive technical analysis of the Golang-written binaries along with an overview of the protocol internals and finally, some attribution information. (more available)
Added: October 18, 2020
image from The 2020 (ISC)2  Cybersecurity Perception Study

The 2020 (ISC)2 Cybersecurity Perception Study

This report discusses the perceptions uncovered by the study and provides conclusions that hiring organizations should consider as they work to locate and recruit additional staff to their cybersecurity teams. (more available)
Added: September 27, 2020
image from 2020 Application Security Observability Report

2020 Application Security Observability Report

A report from aggregate telemetry on Contrast Security customers’ applications between June 2019 and May 2020. Covers application vulnerability prevalence, time to remediation, attacks, and composition, among other themes. (more available)
Added: September 16, 2020
image from Third-Party Security Signals: Exposing the reality of unsafe network services

Third-Party Security Signals: Exposing the reality of unsafe network services

Using RiskRecon’s telemetry of the public risk surface of thousands of organizations, this report takes a look at services which are commonly viewed as unsafe. (more available)
Added: September 2, 2020
image from Implementing Cloud Security Best Practices

Implementing Cloud Security Best Practices

This report covers findings from a survey conducted by Dimensional Research in July 2020. A total of 310 qualified individuals completed the survey. (more available)
Added: August 17, 2020
image from 2020 Mid Year Report

2020 Mid Year Report

This mid year report covers publicly disclosed data breaches first reported between January 1, 2020 and June 30, 2020 and compares current observations to the same time period for prior years. (more available)
Added: August 17, 2020
image from State of Open Source Security Report 2020

State of Open Source Security Report 2020

The annual report from Snyk on the state of open source software from a security perspective. Includes survey data from 500+ developers, internal Snyk vulnerability data from the projects monitored by Snyk, and additional aggregated source code repository data. (more available)
Added: June 25, 2020
image from 2019 Global Security Report

2019 Global Security Report

A year in review report drawing on the events observed by AppRiver Security analysts and the telemetry from the AppRiver security platforms. (more available)
Added: June 13, 2020
image from 2020 Vulnerability Statistics Report

2020 Vulnerability Statistics Report

The fifth edition of Edgescan’s vulnerability statistics report. Uses both scan data and survey data to report on vulnerability management, with a special focus on web application vulnerabilities. (more available)
Added: June 13, 2020
image from 2019 Mobile App Threat Landscape Report

2019 Mobile App Threat Landscape Report

RiskIQ scans mobile application stores and analyzes the apps presented for potential malware and other threats. This annual threat report covers the security posture of the mobile ecosystem, identifying threat actions, and making time comparisons. (more available)
Added: June 11, 2020
image from Ripples Across the Risk Surface

Ripples Across the Risk Surface

Using breach data from Advisen, this report defines ripple effects of breaches as the impacts on companies more than one degree of separation from the company directly affected by the breach. (more available)
Added: June 10, 2020
image from AWS Shield: Threat Landscape Report - Q1 2020

AWS Shield: Threat Landscape Report - Q1 2020

The inaugural threat report from the AWS Shield managed security service. Primarily covers volumetric statistics seen on the AWS Shield platform. (more available)
Added: June 1, 2020
image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.
Added: May 28, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. (more available)
Added: May 21, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 14
  • »
  • »»
© Cyentia Institute 2021
Library updated: February 26, 2021 12:06 UTC (build 7e736b2)