Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from Cyber Trends and Credit Risks

Cyber Trends and Credit Risks

This report underscores the challenge facing corporate, government and not-for-profit debt issuers: rising cybersecurity incidents, higher costs to combat them, and an imbalance in the executive and risk management experience needed to manage them properly. In an ever-more-connected world, the risk of systemic attacks resulting in damaging financial and repetitional consequences keeps increasing.

(more available)
Added: October 26, 2022
image from The State of Authentication in the Finance Industry

The State of Authentication in the Finance Industry

This report shines an important spotlight on the perceptions of global financial institutions around authentication. As the study findings show, these remains much to do to close these security gaps, and traditional MFA methods are not delivering the security that we all need.

(more available)
Added: October 24, 2022
image from Application Protection Report 2022

Application Protection Report 2022

The goal of this report is to document the evolution of the threat landscape over the previous years so security practitioners can tune their defenses to suit. More specifically, this report is intended to clarify the relationship between target characteristics and attacker behavior so that each organization can focus on the threats most applicable to them.

(more available)
Added: October 21, 2022
image from 2021 Malware Report

2021 Malware Report

The 2021 Malware Report is to reveal the latest malware security trends, challenges, and investment priorities. Malware is continuously evolving and organizations are facing significant challenges in responding to the threat and protecting their IT environments against new types of viruses, worms, spyware, ransomware, and crypto-jacking malware.

(more available)
Added: October 18, 2022
image from 2022 Ransomware & Malware Report

2022 Ransomware & Malware Report

Malware and ransomware continue to wreak havoc as some of the most destructive security threats affecting organization of all sizes, from SMBs to large enterprise and government agencies. This report is to reveal the latest malware security trends, challenges, and investment priorities.

(more available)
Added: October 18, 2022
image from Ransomware Report 2022

Ransomware Report 2022

This 2022 Ransomware Report reveals the latest security trends, challenges, and investment priorities for ransomware protection, as reported by over 236 cybersecurity professionals surveyed in 2022. Ransomware attacks are on the rise and continue to wreak havoc as one of the most destructive malware threats that affect organizations of all sizes.

(more available)
Added: October 17, 2022
image from Email Security: The Confidence Game 2022

Email Security: The Confidence Game 2022

The Email Security in 2022: Confidence Game report is based on the results of a comprehensive online global survey of 294 cybersecurity professionals, conducted in Fall 2021, to gain deep insight into the latest trends, key challenges, and solutions for email security. The respondents range from technical executives to managers and IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. The respondents range from technical executives to managers and iT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 14, 2022
image from 2022 Sysdig Cloud-Native Threat Report

2022 Sysdig Cloud-Native Threat Report

This report was complied using Open Source Intelligence (OSINT), the practice of collecting information from published or otherwise publicly available sources, and Sysdig TRT’s global data collection network. Data on cryptominers and DDoS agents was detected through Sysdig’s advanced honeynets. The honeynet is designed to capture attacks and analyze the tools used by threat actors.

(more available)
Added: October 13, 2022
image from The State of Security Posture Report 2022

The State of Security Posture Report 2022

The 2022 State of Security Posture Report reveals that cybersecurity teams are struggling to measure and improve their security posture as their organizations move to the cloud and as their leadership increasingly expects them to measure cyber risk in monetary terms due to the rise of ransomware and the general impact of cyber attacks to business.

(more available)
Added: October 12, 2022
image from Reining in Ransomware

Reining in Ransomware

In this report, we’ve analyzed on-the-ground evidence collected while responding to nearly 1,500 ransomware events exceeding $1 billion in ransom demands. Through it all, we’ve helped our clients manage their response, minimize costs, and maintain business operations. And we hope this report helps many other organizations and insurers do the same.

(more available)
Added: October 11, 2022
image from Acronis Cyber Protection Operation Centers Report

Acronis Cyber Protection Operation Centers Report

This report represents a global outlook and is based on over 700,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as they are much more prevalent compared to macOS and Linux.

(more available)
Added: October 11, 2022
image from You Think Ransomware Is Your Only Problem? Think Again

You Think Ransomware Is Your Only Problem? Think Again

Organizational leaders of all types understand that ransomware can cause extreme damage to the organization’s ability function and, in some cases, even survive. Ransomware is not just an IT issue but a situation involving the highest levels of management, including the CEO. Ransomware attacks can be so significant that they trigger a disaster response using traditional disaster recovery (DR) tools and methods.

(more available)
Added: October 4, 2022
image from Cyber Claims Study 2022 Report

Cyber Claims Study 2022 Report

The 2022 report included data from NetDiligence studies published in 2018-2021, representing 4,036 incidents that occurred in previous years. After the elimination of claims that were less than $1,000, the combined dataset included 6,411 incidents each one a cyber incident insurance claim.

(more available)
Added: October 4, 2022
image from Cyber Security Report 2022

Cyber Security Report 2022

The 2022 Cyber Security Report uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ and increased disruption to everyday life. Education and Research were revealed as the most targeted sector. The report gives a detailed overview of the cyber threat landscape and recommendations on how to prevent the next cyber pandemic.

(more available)
Added: September 29, 2022
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from Cyber Claims Study 2020 Report

Cyber Claims Study 2020 Report

This report includes incidents that occurred during 2015-2019. A total of 3,547 claims were analyzed, and data was distilled into over 100 categories. To compare, the fifth Cyber Claims Study, published in 2015, analyzed 207 cyber insurance claims. While many of the categories over the last five years have remained the same, the data has changed, sometimes dramatically.

(more available)
Added: September 20, 2022
image from Cyber Claims Study 2019

Cyber Claims Study 2019

This study, based on over 2,000 cyber claims, provides a comprehensive view of recent cyber claim events. The 2019 report also included data from NetDiligence studies published in 2015-2018, representing 1,008 events that occurred in 2014 to 2017. After the elimination claims that were less than $1,000, the combined dataset included 2,081 events, each one a data breach insurance claim.

(more available)
Added: September 20, 2022
image from Gaming Respawned

Gaming Respawned

This SOTI report looks at current state of online gaming. it also examines the most pervasive threats coming from online criminals. Ans to fully explore the topic of attacks on gaming, we dig deeper into the data around web application and API attacks, Distributed Denial of Service (DDoS) trends, the overarching goals of attackers, and more. This report also explored the threat landscape that has grown out of the pandemic in the gaming industry and the impact of cyberattacks on gaming companies.

(more available)
Added: September 14, 2022
image from The State of Email Security 2022

The State of Email Security 2022

Mimecast’s State of Email Security 2022 (SOES) study sheds light on the gains in cyber resilience that many companies are making, even as it reveals shortfalls and places where there is considerable room for improvement.

(more available)
Added: September 13, 2022
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 12:08 UTC (build b1d7be4)