Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Event frequency

Below you will find reports with the tag of “Event frequency”

image from Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

Quantifying the financial savings Protective DNS (PDNS) brings to the UK public sector

This report provides an analysis of the DNS queries blocked by Protective DNS, finds commonalities among the end users that are protected, and uses a financial model to estimate the value of the threat prevention provided by Protective DNS to the UK economy. (more available)
Added: May 11, 2022
image from Threat Intelligence Executive Report 2022 Vol. 1

Threat Intelligence Executive Report 2022 Vol. 1

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider. (more available)
Added: April 20, 2022
image from IRIS Risk Retina - Nonprofit

IRIS Risk Retina - Nonprofit

This free public report from the Cyentia IRIS Risk Retina series clears away the fog of FUD, providing parameters for frequency and loss of publicly discoverable cyberevents in the nonprofit sector. (more available)
Added: March 21, 2022
image from Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

We do two very important and timely things in this report. We first explore ways to measure exploitability for individual vulnerabilities—and far more importantly—entire organizations. (more available)
Added: January 20, 2022
image from The state of cybersecurity resilience 2021

The state of cybersecurity resilience 2021

More than 4,700 executives were surveyed in March and April of 2021 in order to understand the extent to which organizations prioritize security, how comprehensive their security plans are, and how their security investments are performing. (more available)
Added: January 7, 2022
image from Prioritization to Prediction Volume 7: Establishing Defender Advantage

Prioritization to Prediction Volume 7: Establishing Defender Advantage

Do exploit code releases help or harm defenders? We decided to put this hotly contested debate to the test. The seventh volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute attacks this debate from all angles. (more available)
Added: May 13, 2021
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.
Added: November 21, 2020
image from IRIS 20/20 Xtreme

IRIS 20/20 Xtreme

The IRIS 20/20 Xtreme is a follow-up to the IRIS 20/20 study earlier this year, this time focusing on the 100 largest cyber incidents of the last five years, totaling $18 billion in reported losses and 10 billion compromised records. (more available)
Added: November 10, 2020
image from Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

Threat Spotlight: Spear-phishing Attacks Targeting Education Sector

This report looks into spear-phishing attacks as the education sector has moved to be remote. It looks at trends in ways they are targeting schools, as well as solutions organizations can use to defend against these attacks. (more available)
Added: October 29, 2020
image from When the World Stayed Home

When the World Stayed Home

This report was compiled from interviews with 1,004 company leaders in order to find the effect of remote work on their companies. (more available)
Added: September 27, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.
Added: September 25, 2020
image from DDoS Threat Report Q2 2019

DDoS Threat Report Q2 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 2nd quarter of 2019.
Added: September 16, 2020
image from DDoS Threat Report Q1 2019

DDoS Threat Report Q1 2019

This quarterly threat report offers insight into the DDoS attacks that occurred in the 1st quarter of 2019.
Added: September 16, 2020
image from DDoS Threat Report Q3 2019

DDoS Threat Report Q3 2019

This report takes a look at the DDoS threats that occurred in the third quarter of 2019.
Added: September 16, 2020
image from 2020 State of Cyber Resilience: Innovate for Cyber Resilience

2020 State of Cyber Resilience: Innovate for Cyber Resilience

This report goes into the general state of cyber resilience. At a glance, Innovation investment is growing, Cybersecurity basics are better, and leading organizations are getting better at preventing and fixing breaches. (more available)
Added: July 29, 2020
image from Information Risk Insights Study (IRIS) 20/20

Information Risk Insights Study (IRIS) 20/20

Using breach information from Advisen, this report seeks to fill in missing gaps in the loss frequency and impact side of quantitative risk analysis. (more available)
Added: June 10, 2020
image from AWS Shield: Threat Landscape Report - Q1 2020

AWS Shield: Threat Landscape Report - Q1 2020

The inaugural threat report from the AWS Shield managed security service. Primarily covers volumetric statistics seen on the AWS Shield platform. (more available)
Added: June 1, 2020
image from Cloud Adoption and Risk Report: Work from Home Edition

Cloud Adoption and Risk Report: Work from Home Edition

This threat report covers traffic and attack trends, with industry and geographical breakdowns, for the first several months of 2020. A special focus on the use of cloud and SAAS providers supporting telework is included. (more available)
Added: May 28, 2020
image from Radware DDoS Protection Market Impact Report

Radware DDoS Protection Market Impact Report

This report goes in depth on Radware’s performance in mitigating DDoS attacks.
Added: May 21, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. (more available)
Added: May 21, 2020
image from Global DDoS Threat Landscape 2019

Global DDoS Threat Landscape 2019

This is a report put out by Impervia based on their 2019 DDoS attack study. Their analysis of attacks is based on data from 3,643 network layer DDoS attacks on websites using Imperva services from January 1, 2019 through December 31, 2019, and on 42,390 application layer attacks on websites using Imperva services from May 1, 2019 through December 31, 2019,
Added: May 11, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)