Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Disruption

Below you will find reports with the tag of “Disruption”

image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from Cyber Attacks: Power Failure Implications

Cyber Attacks: Power Failure Implications

A paper discussing the impact of a cyber attack on the power grid.

Added: October 13, 2018
image from Cyber Threats To The Education Industry

Cyber Threats To The Education Industry

Understand the cyber threats targeting the education industry, including subsectors impacted by advanced threat groups.

Added: October 13, 2018
image from Industry 4.0: The World Of Making Is Changing

Industry 4.0: The World Of Making Is Changing

This well designed Report provides excellent articles and insight into the growth of devices and Cyber Security.

Added: October 13, 2018
image from Most Companies Unprepared For DNS Attacks

Most Companies Unprepared For DNS Attacks

As such, this survey sought to explore the state of DNS security in the cybersecurity/IT market, discover how highly IT and cybersecurity professionals rank DNS security, and gauge the strength of the DNS protections enterprises have in place.

(more available)
Added: October 13, 2018
image from Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

Security Response: Dridex Tidal Waves Of Spam Pushing Dangerous Financial Trojan

This report takes a look a the Trojan, Dridex.

Added: October 13, 2018
image from State of the Internet Security Web Attacks Summer 2018

State of the Internet Security Web Attacks Summer 2018

From the report, “This quarter, we’re taking a deeper look into the attacks directed against the hospitality industry - including hotel, travel, and airline sites - in an effort to understand why five out of six logins at these sites use fake or stolen credentials. We were surprised to find that many of these login attempts were coming from Russia and China, a departure from the general attack trends.”

(more available)
Added: October 13, 2018
image from The Enterprise Lacks A Big Data Strategy For IoT Transformation

The Enterprise Lacks A Big Data Strategy For IoT Transformation

From the report, “Internet of Things (IoT) technology holds incredible promise for transforming the enterprise, but one of the biggest hurdles for companies implementing IoT will be extracting insight from the incredible volumes of fast-moving data these systems produce and integrating that resulting intelligence into business processes in real time.”

(more available)
Added: October 13, 2018
image from Cybersecurity Challenges in Aviation

Cybersecurity Challenges in Aviation

This paper discusses the issues and challenges involved in maintaining good cybersecurity in the field of aviation.

Added: October 12, 2018
image from Cybersecurity In Healthcare: The Diagnosis

Cybersecurity In Healthcare: The Diagnosis

This report was commissioned to understand whether or not the healthcare industry was prepared for the growing and evolving cybersecurity threats.

(more available)
Added: October 12, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
image from Hackerpocalypse: A Cybercrime Revelation

Hackerpocalypse: A Cybercrime Revelation

From the report, “The primary goal of our report is to spark major discussion around cybercrime — and cyber defense — from local, national, and global political and business leaders. We invite broadcasters, publishers, editors, reporters, and bloggers to borrow generously from our report in their efforts raise up cybersecurity in the public’s consciousness.”

(more available)
Added: October 12, 2018
image from Regional Advanced Threat Report: Latin America 1H 2015

Regional Advanced Threat Report: Latin America 1H 2015

This report discusses trends in the cyber security environment in Latin America from January to June 2015.

Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
image from The Distributed Organization And The Demise Of Traditional Web Gateways

The Distributed Organization And The Demise Of Traditional Web Gateways

In this paper, they look at how most organizations have shifted from centralized to distributed operations, and what that change means from a cybersecurity perspective. They also examine the deficiencies of traditional on-prem, hybrid, and all-cloud secure web gateway solutions.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)