Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Extortion

Below you will find reports with the tag of “Extortion”

image from Aon's E&O | Cyber Insurance Snapshot

Aon's E&O | Cyber Insurance Snapshot

A review of current trends in the cyber insurance space, including key threat trends, claim frequency, severity, and pricing factors.
Added: March 8, 2021
image from ESET Threat Report Q4 2020

ESET Threat Report Q4 2020

This report reflects on the key threats that emerged or expanded in the 4th quarter of 2020.
Added: February 24, 2021
image from A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

A Constant State of Flux: Trend Micro 2020 Annual Cybersecurity Report

This report examines the most important stories, issues, and trends that affected the cybersecurity landscape in 2020.
Added: February 24, 2021
image from Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

This report covers the cybersecurity threats tied to COVID-19 pandemic observed over the past year, detailing the socioeconomic drivers that contributed to the threat landscape. (more available)
Added: January 29, 2021
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

This report explores many different areas of cybersecurity in 2020, including how ransomware has changed, why nation-state actors have been so motivated to target organizations, and also the growing importance of layering security transformation into your digital transformation strategies. (more available)
Added: January 29, 2021
image from Fraud in the Wake of COVID-19: Benchmarking Report

Fraud in the Wake of COVID-19: Benchmarking Report

This report provides the results of the third study the ACFE has done on the fight against fraud in the wake of COVID-19. (more available)
Added: January 21, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from The Hidden Costs of Cybercrime

The Hidden Costs of Cybercrime

This report looks at the costs of cybercrime, money or otherwise, and the effect it has on selected sectors. It then gives recommendations for decision makers in order to prevent cybercrime. (more available)
Added: December 18, 2020
image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them. (more available)
Added: December 18, 2020
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers. (more available)
Added: December 18, 2020
image from 2020 State of Data Security Report- 10 Trends to Watch

2020 State of Data Security Report- 10 Trends to Watch

This report is based on a survey aimed at understanding how businesses keep information safe. They outline 10 data breach trends and how they have changed in 2020. (more available)
Added: December 16, 2020
image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint. (more available)
Added: December 9, 2020
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security. (more available)
Added: December 1, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.
Added: December 1, 2020
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI. (more available)
Added: November 30, 2020
image from The Great Cyber Surrender

The Great Cyber Surrender

This report looks at the scale and complexity of cyberattacks on individuals and firms. It then goes into what needs to be done to deal with the complex and evolving threat of cyber attacks. (more available)
Added: November 30, 2020
image from 2020 Crowdstrike Global Security Attitude Survey

2020 Crowdstrike Global Security Attitude Survey

A survey of 2,200 IT professionals from organizations of 250 or more employees. Focuses on attitudes on and about cybersecurity.
Added: November 21, 2020
image from IRIS 20/20 Xtreme

IRIS 20/20 Xtreme

The IRIS 20/20 Xtreme is a follow-up to the IRIS 20/20 study earlier this year, this time focusing on the 100 largest cyber incidents of the last five years, totaling $18 billion in reported losses and 10 billion compromised records. (more available)
Added: November 10, 2020
image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19. (more available)
Added: November 6, 2020
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back. (more available)
Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks. (more available)
Added: October 30, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 29
  • »
  • »»
© Cyentia Institute 2021
Library updated: April 20, 2021 12:07 UTC (build f09024c)