Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from Morphisec Labs Threat Report: December 2018

Morphisec Labs Threat Report: December 2018

This Morphisec Labs Threat Report is based on anonymized threat data collected from approximately 2,000,000 installed Morphisec endpoint agents as well as in-depth investigations conducted by Morphisec researchers. It includes observations about trends in the wider security landscape together with analyses of the tactics and techniques used by malicious actors.

(more available)
Added: January 15, 2019
image from 2017 State Of The Software Supply Chain

2017 State Of The Software Supply Chain

This 2017 report has similarities to previous years, but there are three differences worth noting. First, the analysis in this year’s report extends beyond Java and includes supply chain findings for JavaScript, NuGet, Python, and Docker. Second, this year’s paper includes a stronger emphasis on the emergence of DevOps and reflects on the evolution of modern IT organizations as they seek to transform from waterfall-native to DevOps-native software development. Lastly, this year’s research delves deeper into the rapidly evolving role of regulation, legislation, and litigation with respect to open source governance and software supply chain management.

(more available)
Added: January 15, 2019
image from Ransomware A Growing Enterprise Threat

Ransomware A Growing Enterprise Threat

This report offers insight into Ransomware and explains the growing threat that impacts enterprise security.

Added: January 1, 2019
image from Cybersecurity During A Merger

Cybersecurity During A Merger

Cybersecurity has emerged as a key risk factor to be weighed during the due diligence process of any merger and acquisition. How should organizations on both sides approach the process? Steve Chabinsky of CrowdStrike shares his thoughts on strategy for assessing cyber risk during the M&A due diligence process.

(more available)
Added: January 1, 2019
image from Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? Shawn Henry of Crowdstrike offers insight on how we need to evolve our core defenses.

(more available)
Added: January 1, 2019
image from Seizing Control OF Software Supply Chain Security

Seizing Control OF Software Supply Chain Security

This paper presents the results of a survey that sought to understand how IT decision makers are thinking about the term “software supply chain attacks.”

(more available)
Added: January 1, 2019
image from Hacking, Escalating Attacks And The Role Of Threat Hunting

Hacking, Escalating Attacks And The Role Of Threat Hunting

This research was conducted to understand the challenges and issues facing UK businesses right now in their fight against cybercrime including hacking, malicious attacks, and breaches, and to scope how organisations are using threat hunting to strengthen their defences.

(more available)
Added: January 1, 2019
image from Telstra Security Report 2018

Telstra Security Report 2018

This report offers an analysis of may of the significant cyber security events of 2017.

Added: January 1, 2019
image from Security Is A Big Data Problem - It Belongs In The Cloud

Security Is A Big Data Problem - It Belongs In The Cloud

This white paper seeks to explore more fully how traditional AV has had its day, and how the principles of big data are now applicable to both detecting and preventing IT security threats.

(more available)
Added: January 1, 2019
image from Replace AV Buyers Guide

Replace AV Buyers Guide

Carbon Black adapts key sections from the SANS Buyer’s Guide for Endpoint Security and provides assistance for helping you assess your options.

(more available)
Added: January 1, 2019
image from Quarterly Incident Response Threat Report: July 2018

Quarterly Incident Response Threat Report: July 2018

This report from July of 2018 discusses China, Russia & North Korea Launching Sophisticated Espionage-Focused Cyberattacks.

Added: January 1, 2019
image from Cyrptocurrency Gold Rush on the Dark Web

Cyrptocurrency Gold Rush on the Dark Web

From the report, “During the past six months, Carbon Black looked into the dark web to determine how cryptocurrency malware is being bought and sold, fostering a burgeoning economy designed to pilfer some of the most popular cryptocurrencies on the market.”

(more available)
Added: January 1, 2019
image from Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

Modern Bank Heists: Cyberattacks & Lateral Movement in the Financial Sector

In this survey of 40 CISO’s from major financial institutions, revealed trends in lateral movement, counter incident response, integrity attacks and the most concerning threat actors organizations face.

(more available)
Added: January 1, 2019
image from Top 5 Reasons Why Savvy MSPS Are Adopting Managed Security Services

Top 5 Reasons Why Savvy MSPS Are Adopting Managed Security Services

The purpose of this white paper is to introduce managed security services as a key strategy for evolving your business.

(more available)
Added: December 29, 2018
image from Exclusive Report: WannaCry One Year On

Exclusive Report: WannaCry One Year On

This report draws conclusions from the data to understand why organizations are struggling to take actions from lessons learned from a year of the WannaCry virus.

(more available)
Added: December 29, 2018
image from Predictive Malware Response Test

Predictive Malware Response Test

SE Labs tested a product from Cylance and sought to discover its weaknesses.

Added: December 29, 2018
image from McAfee Labs Threats Report - December 2018

McAfee Labs Threats Report - December 2018

This report provides insight into the top stories from the third quarter of 2018.

Added: December 29, 2018
image from Endpoint Security Isn't Dead - It's Just Getting Smarter

Endpoint Security Isn't Dead - It's Just Getting Smarter

This report details a new Cylance survey of iTnews readers and provides insight into the state of endpoint security.

Added: December 29, 2018
image from Reinventing Cybersecurity Prevention With Deep Learning

Reinventing Cybersecurity Prevention With Deep Learning

In this whitepaper they cover the different defense technologies used over time, how different attacks vectors influenced this evolution, how the industry adopted different approaches over time, and why the prevention approach has returned and why it matters.

(more available)
Added: December 29, 2018
image from 2017 Threat Report Discussion Guide

2017 Threat Report Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The information provided in the report is unavailable anywhere else. This Cylance® study includes research and information drawn from internal data and feedback provided by Cylance customers. The report offers considerable insights into recent threat trends and related security issues.

(more available)
Added: December 29, 2018
image from Services Cyber Intrusion Casebook 2018

Services Cyber Intrusion Casebook 2018

In 2018, our global Services team focused resources, intelligence and technology to detect and disrupt future attacks. We’ve analyzed the massive amounts of security data collected from every engagement this year and we’ve gained new insights into what challenges organizations face and how they can better prepare for the next wave of threats. This casebook presents some of the findings and recommendations we’ve made in key engagements across a representative sample of the work we performed last year. We dig into: Emerging and notable trends Examples of ill-prepared organizations and the devastating effects of the breaches they suffered Essential recommendations to prevent companies from becoming another statistic of poor security planning and execution This casebook also underscores the expertise of our team and the important work we’re doing at CrowdStrike® Services. As you read the case studies, you will see that CrowdStrike stands shoulder-to-shoulder with our clients as we work together to stop adversaries and repair damage. But this casebook is not just for CrowdStrike clients — we want everyone to become better prepared to overcome their adversaries in 2019.

(more available)
Added: December 14, 2018
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)