Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Disruption

Below you will find reports with the tag of “Disruption”

image from 2021 Data Risk Report: Financial Services

2021 Data Risk Report: Financial Services

This report focus on the data security of the financial industry: banking, insurance, and investments. It draws correlations between the current state of the security and the threats that are yet to come.

(more available)
Added: November 30, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.

Added: September 25, 2020
image from Cybercrime: COVID-19 Impact

Cybercrime: COVID-19 Impact

Interpol’s Cybercrime Directorate produced this Global Assessment Report on COVID-19 related Cybercrime based on data from 194 countries and private partners to provide a comprehensive overview of the cybercrime landscape amid the pandemic.

(more available)
Added: September 3, 2020
image from Upstream Security's Global Automotive Cybersecurity Report 2020

Upstream Security's Global Automotive Cybersecurity Report 2020

This report highlights research into cyber-attack trends in the smart mobility ecosystem.

Added: July 31, 2020
image from What Doxxing Victims Reveal About "Targeted Attacks"

What Doxxing Victims Reveal About "Targeted Attacks"

A review of doxxing related ransomware cases handled by Kivu Consulting in a post-breach role. Explores firmographics of the organizations involved in various variants of ransomware families.

(more available)
Added: July 27, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents.

(more available)
Added: July 1, 2020
image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.

(more available)
Added: May 28, 2020
image from Global DDoS Threat Landscape 2019

Global DDoS Threat Landscape 2019

This is a report put out by Impervia based on their 2019 DDoS attack study. Their analysis of attacks is based on data from 3,643 network layer DDoS attacks on websites using Imperva services from January 1, 2019 through December 31, 2019, and on 42,390 application layer attacks on websites using Imperva services from May 1, 2019 through December 31, 2019,

(more available)
Added: May 11, 2020
image from 2020 Q1 Report Data Breach QuickView

2020 Q1 Report Data Breach QuickView

This report goes in depth into the overall changes in data breaches in the first part of 2020. Some highlights are that the number of publicly reported breaches decreased by 42% from 2019. and the number of records exposed grew 273% since last year.

(more available)
Added: May 11, 2020
image from Information Security and Privacy in the Times of COVID-19

Information Security and Privacy in the Times of COVID-19

This is a small infographic created by ISACA that outlines key findings from their COVID-19 study done in April 2020.

(more available)
Added: May 8, 2020
image from The Global State of Industrial Cybersecurity

The Global State of Industrial Cybersecurity

In this report, we explore the state of OT security from the perspective of IT security practitioners, and provide practical recommendations on how to bridge the IT and OT cybersecurity gap. This report also examines the to OT security.

(more available)
Added: April 5, 2020
image from Digital Pulse Coronavirus Flash Survey March 2020

Digital Pulse Coronavirus Flash Survey March 2020

This document is the product of a flash survey, an unscheduled, event-driven survey with a fast turnaround to cover a rapidly evolving situation relevant to tech markets. This survey was designed to measure the impact of the COVID-19 coronavirus outbreak on businesses. It was conducted between March 10 and March 19, 2020, and represents approximately 820 completes from pre-qualified IT decision-makers.

(more available)
Added: April 4, 2020
image from Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations

Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations

With this common understanding in mind, we have taken a comprehensive look at previously disclosed activity that can now be attributed to the GRU. Numerous governments, security firms, researchers, reporters, academics, and victims have released reports detailing different facets of the GRU’s activities. Our review identified more than 200 cyber incidents, spanning 15 years (2004–2019), targeting governments, the private sector, and members of civil society. These operations have discovered and disclosed secrets, defamed people, disinformed populations, and destroyed or disrupted computerized systems.

(more available)
Added: April 4, 2020
image from Resilience360 Annual Risk Report 2020

Resilience360 Annual Risk Report 2020

The insights presented in this report will help guide your supply chainmonitoring and risk mitigation strategy, enable better informed decision-making processes, and aid the formulationof responses that create more resilient and sustainablebusiness operations.

(more available)
Added: March 29, 2020
image from Threat Landscape Report Q4 2019

Threat Landscape Report Q4 2019

This is the threat landscape report from Fortinet for the 4th quarter of 2019. It goes into changes in this quarter, including threat detection changes and attack changes.

(more available)
Added: March 15, 2020
image from 2019 Year in Review: Lessons Learned from the Front Lines of ICS Cybersecurity

2019 Year in Review: Lessons Learned from the Front Lines of ICS Cybersecurity

This report - compiled from the engagements performed throughout 2019 in customer environments by our threat hunting, penetration testing, incident response, tabletop exercise, and assessments teams

(more available)
Added: March 1, 2020
image from Global DDoS Threat Landscape Q4 2017

Global DDoS Threat Landscape Q4 2017

Imperva outlines trends in the DDoS threat landscape in 2017, including that the number of attacks has doubled, that crypto-currency continues to be targeted, and that persistent attacks are growing more common.

(more available)
Added: February 17, 2020
image from 2020 Connectivity Benchmark Report

2020 Connectivity Benchmark Report

This report covers connectivity trends for 2020. It goes over four main key findings, including that data silos are slowing digital transformation, that organizations are reaping the benefits of APIs, that IT teams with an API strategy drive greater business outcomes, and that top-down API strategies are the most effective.

(more available)
Added: February 17, 2020
image from Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Exploring Coordinated Disclosure: Shedding Light on Perceptions and Experience in How Software Vulnerabilities are Reported

Veracode commissioned this survey from 451 Research to understand how widely accepted andpracticed coordinated disclosure – whereby a security researcher identifies a flaw and notifiesthe company, then the two work together to fix and publicly disclose the flaw – really is andwhere the pain points reside. In addition, we wanted to explore the means organizations haveestablished to receive vulnerability reports, and the attitudes toward a coordinated disclosurepolicy on both sides of the organization and among external security researchers. We also soughta deeper understanding of the motivations of security researchers, actions when a vulnerabilityis identified, timing for disclosure, desired outcomes, how organizations structure disclosurepolicies, and the effectiveness of bug bounties.

(more available)
Added: February 12, 2020
image from The State of Application Development

The State of Application Development

This report from Outsystems is based off of a survey of over 3,300 companies. It had 5 key things they looked into: How organizations’ app dev practices adapt to meet digital transformation and agility objectives, challenges in meeting application development goals, strategies IT teams use to speed up application delivery, and if these strategies are working to overcome resource constraints and reduce backlogs.

(more available)
Added: February 12, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: February 9, 2020
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)