Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Disruption

Below you will find reports with the tag of “Disruption”

image from CIO Survey 2018: The Transformational CIO

CIO Survey 2018: The Transformational CIO

In last year’s survey, Harvey Nash and KPMG reported how CIOs were holding a steady line in the face of global uncertainty, cutting costs and refining business processes. Whilst much of this geopolitical instability remains, this year’s report shows how CIOs are benefiting from bigger budgets and headcount growth. Indeed, more IT leaders are enjoying budget increases than we have seen in the last thirteen years of reporting.

(more available)
Added: October 24, 2018
image from Is Cyber Risk Systemic?

Is Cyber Risk Systemic?

In this report, they examine the results of a survey that attempted to provide a deeper understanding of the views of the likelihood and impact of a systemic cyber-attack.

(more available)
Added: October 24, 2018
image from Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

Lessons From Others For Future U.S. Army Operations In And Through The Information Environment

This project sought to draw lessons from the efforts of others (both nation-state and nonstate actors) in and through the IE for future U.S. Army force planning and investment. These case studies of other forces can help the Army (1) identify capabilities and practices that it should consider adopting and (2) identify adversary capabilities and practices that it must be prepared to counter in future operations in and through the IE.

(more available)
Added: October 24, 2018
image from Ransomware: Unlocking The Lucrative Criminal Business Model

Ransomware: Unlocking The Lucrative Criminal Business Model

This is a well written exclusive look at Ransomware.

Added: October 24, 2018
image from State of the Internet Security 3rd Quarter 2017

State of the Internet Security 3rd Quarter 2017

This is Akamai’s State of The Internet Security report from the third quarter of 2017

Added: October 24, 2018
image from The State Of Application Survey 2018

The State Of Application Survey 2018

Before slowing down development and causing customers to revolt, security and risk pros should read this report to understand the current state of application security and how emerging techniques support the speed your business needs.

(more available)
Added: October 24, 2018
image from 2016 Cyber Security Intelligence Index

2016 Cyber Security Intelligence Index

This paper is an Analysis of cyber attack and incident data from IBM’s worldwide security services operations.

Added: October 23, 2018
image from Anatomy Of A Cyber Extortion Operation

Anatomy Of A Cyber Extortion Operation

In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations.

(more available)
Added: October 23, 2018
image from Exploring Strategic Risk

Exploring Strategic Risk

This paper discusses the strategic risks facing coroporations today.

Added: October 23, 2018
image from ISTR Financial Threats Review 2017

ISTR Financial Threats Review 2017

This special report examines threats to the financial sector.

Added: October 23, 2018
image from 2018 Connectivity Benchmark Report

2018 Connectivity Benchmark Report

This report, which benchmarks how IT decision makers are handling digital transformation, IT operations, and change management, takes an in-depth look at where organizations are on their digital journey and uncovers the challenges they face when integrating new and existing technologies.

(more available)
Added: October 22, 2018
image from Demand More From Your Enterprise CDN

Demand More From Your Enterprise CDN

This e-book takes a look at what a good CDN should do.

Added: October 22, 2018
image from Quarterly Report Q3 2017

Quarterly Report Q3 2017

This is a quarterly report that looks at cyber security issues in New Zealand and around the world.

Added: October 22, 2018
image from The Four Types Of Threat Detection

The Four Types Of Threat Detection

There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.

(more available)
Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from Boards Turn To The Talent Agenda

Boards Turn To The Talent Agenda

This report discusses how the boards of organizations are changing their hiring practices due to the impact of cybersecurity incidents.

(more available)
Added: October 21, 2018
image from ENISA Threat Taxonomy: A tool for structuring threat information.pdf

ENISA Threat Taxonomy: A tool for structuring threat information.pdf

The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as definitions of the various threats mentioned.

(more available)
Added: October 21, 2018
image from It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture

This paper presents the testimony, of Martin Libicki, presented before the House Armed Services Committee on March 1, 2017.

Added: October 21, 2018
image from Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers

The decision to deploy code to containers versus virtual machines or dedicated servers has some unique characteristics. Amalgam Insights has identified seven key decision points that should be considered when choosing to deploy to containers. These seven decision points can act as guideposts that will help point to or from using containers.

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)