Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Financial Gain

Below you will find reports with the tag of “Financial Gain”

image from MediaPro Best Practice Series: Battling The Forgetting Curve

MediaPro Best Practice Series: Battling The Forgetting Curve

This paper seeks to provide guidance in understanding the best ways to train employees so that the don’t forget important information.

(more available)
Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
image from Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

Soft Target:The Top 10 Vulnerabilities Used by Cybercriminals

This annual report takes a look at the most popular vulnerabilites used by cybercriminals. It intends to help organizations make good, informed decisions about their cyber security.

(more available)
Added: October 23, 2018
image from State Of The Channel Ransomware Report

State Of The Channel Ransomware Report

Datto surveyed 1,100 MSPs about ransomware and cybersecurity and published the key findings in this report. We aim to provide the Channel perspective on this growing epidemic and highlight the current prevalence of the malware, its behavior, its target, and its impact within the global small business community. In the end, we’ll provide best practices and solutions for businesses looking to ensure total data protection, business continuity and disaster recovery.

(more available)
Added: October 23, 2018
image from 2016 Global Threat Report

2016 Global Threat Report

The Forcepoint 2016 Global Threat Report is a definitive breakdown of many of today’s most impactful cybersecurity threats with far-reaching technical, operational and cost impacts on affected organizations. Each section of this report closes with guidance from the Forcepoint Security Labs team on how to best address the outlined threat(s).

(more available)
Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The object of this report is to answer the question, what will happen in 2018?

Added: October 22, 2018
image from 2017 Annual Threat Report

2017 Annual Threat Report

The goal of the SonicWall Annual Threat Report is to define the cybersecurity battlefield in order to enable companies and individuals around the world to mount an impenetrable defense in 2017 and beyond.

(more available)
Added: October 22, 2018
image from 2017 Cybersecurity Threat Insights Report For Leaders

2017 Cybersecurity Threat Insights Report For Leaders

From the report, “When we set out to develop a report based on our 163 incident response client engagements over the course of the first half (H1) of 2016, we captured empirical data on type of threats, affected industries, and initial access vectors that threats use. However, we went back to the drawing board to ask ourselves, “What do organizations challenged by cyber threats and cyber risk actually need to know?” As a result, this report takes the form of an advisory aimed at jarring Security and C-Suite leaders just enoug to evoke positive action and a recalibration of their approaches to security.”

(more available)
Added: October 22, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from Cyber Insurance Survey 2014

Cyber Insurance Survey 2014

This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents.

(more available)
Added: October 22, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.

Added: October 22, 2018
image from Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and beyond: Reaping the dividends of cyber resilience is the latest viewpoint in PwC’s Insurance 2020 and beyond series, which explores the megatrends that are reshaping the competitive environment for insurers, reinsurers, brokers and the markets in which they operate.

(more available)
Added: October 22, 2018
image from Quarterly Threat Report Q4 2017

Quarterly Threat Report Q4 2017

This quarterly report offers key takeaways from the fourth quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 22, 2018
image from SamSam Ransomware Chooses Its Targets Carefully

SamSam Ransomware Chooses Its Targets Carefully

This report takes a look at the SamSam ransomware. A ransomware that unlike most ransomware, goes after specific organizations.

Added: October 22, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.

Added: October 22, 2018
image from 2017 State Of Cybercrime

2017 State Of Cybercrime

The goal of this report is to help all organizations better protect themselves from current and emerging cyber threats; to help make them become smarter and safer.

(more available)
Added: October 21, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from Cryptocurrency Mining Malware

Cryptocurrency Mining Malware

This e-book provides a helpful analysis of malware that mines cryptocurrency.

Added: October 21, 2018
image from How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

How Cybercriminals Can Abuse Chat Platform API's As C&C Infrastructures

This paper presents exclusive research into how chat platforms can be abused and become a cyber security weakness.

Added: October 21, 2018
image from How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

How The Rise Of Cryptocurrencies Is Shaping The Cyber Crime Landscape

This blog post discusses cyber crime as it relates to cryptocurrencies and how it is changing the landscape.

Added: October 21, 2018
  • ««
  • «
  • 29
  • 30
  • 31
  • 32
  • 33
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 04:08 UTC (build b1d7be4)