Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Insider

Below you will find reports with the tag of “Insider”

image from 2022 Cloud Security Report

2022 Cloud Security Report

This 2022 Cloud Security Report, based on a comprehensive global survey of cybersecurity professionals, reveal these security challenges and offers insights on the state of the cloud and cloud security today. (more available)
Added: May 20, 2022
image from 2022 Voice of the CISO Report

2022 Voice of the CISO Report

This report explores how CISOs are adjusting in the wake of pandemic disruption, adapting strategies to support long-term hybrid work and battling an increasingly sophisticated threat landscape. (more available)
Added: May 18, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020. (more available)
Added: January 13, 2022
image from Cybersecurity Challenges in Financial Services - Marker Survey Report

Cybersecurity Challenges in Financial Services - Marker Survey Report

This report is based on a survey of 250 cybersecurity and IT decision-makers. It aims to provide insight on cybersecurity challenges in financial services in the age of COVID-19. (more available)
Added: November 6, 2020
image from Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

Zerologon: Unauthenticated Domain Controller Compromise by Subverting Netlogon Cryptography (CVE-2020-1472)

This whitepaper explains a new vulnerability in Windows Server that is highly exploitable.
Added: October 18, 2020
image from 2020 State of SaaSOps

2020 State of SaaSOps

This report gives insight on how modern IT organizations deal with the challenges of managing Saas at scale.
Added: October 11, 2020
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.
Added: September 28, 2020
image from The CISO Current Report, Q2 2020

The CISO Current Report, Q2 2020

This paper compiles observations as well as predictions on the state of cybersecurity in 2020.
Added: August 17, 2020
image from SolarWindws Public Sector Cybersecurity Survey Report

SolarWindws Public Sector Cybersecurity Survey Report

A survey of 400 public sector IT decision makers and influencers to determine challenges faced by public sector IT professionals, security threats, and cybersecurity capabilities. (more available)
Added: July 22, 2020
image from 2020 Incident Response and Data Breach Report

2020 Incident Response and Data Breach Report

Drawn on over 1,000 incidents that The Crypsis Group responded to in 2019, this report looks for trends in industry and attack patterns for the past year. (more available)
Added: July 6, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners. (more available)
Added: June 13, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. (more available)
Added: May 21, 2020
image from The State of Enterprise IT in 2020

The State of Enterprise IT in 2020

The following report provides insights about what did and did not change in status and viewpoints between 2019 and 2020 and why. (more available)
Added: May 8, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available)
Added: May 8, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats. (more available)
Added: March 29, 2020
image from M-Trends 2020

M-Trends 2020

FireEye has been detecting and responding to cyber attacks every day for over 15 years. The release of M-Trends® 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks. (more available)
Added: March 1, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. (more available)
Added: February 18, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure. (more available)
Added: February 9, 2020
image from 2019 Data Exposure Report

2019 Data Exposure Report

The 2019 Data Exposure Report is based on our survey of 1,028 information security leaders, as well as 615 business decision-makers, all with budgetary decision-making power. (more available)
Added: February 6, 2020
image from Privileged Access Threat Report 2019

Privileged Access Threat Report 2019

In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks. (more available)
Added: February 6, 2020
image from The Secure Access Threat Report 2017

The Secure Access Threat Report 2017

Bomgar outlines how to defend against security threats, showing two distinct groups of threats, prevention techniques, etc.
Added: February 6, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)