Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Insider

Below you will find reports with the tag of “Insider”

image from 2020 Incident Response and Data Breach Report

2020 Incident Response and Data Breach Report

Drawn on over 1,000 incidents that The Crypsis Group responded to in 2019, this report looks for trends in industry and attack patterns for the past year. Primary focus areas for the report are ransomware, business email compromise (BEC), and data breaches. Also includes suggestions on defensive measures where appropriate.

(more available)
Added: July 6, 2020
image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. The Securonix Threat Research Team has analyzed hundreds of incidents across several industry verticals in order to understand the various behavior patterns that impose risk to organizations. In this report we take a closer look at such behaviors by examining reallife incidents across number of dimensions such as motive and type of risks against industry verticals.

(more available)
Added: May 21, 2020
image from The State of Enterprise IT in 2020

The State of Enterprise IT in 2020

The following report provides insights about what did and did not change in status and viewpoints between 2019 and 2020 and why.

(more available)
Added: May 8, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. It takes planning, collaboration, and the right tools to meet the needs of security, IT, desktop support, and users.

(more available)
Added: May 8, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats.

(more available)
Added: March 29, 2020
image from M-Trends 2020

M-Trends 2020

FireEye has been detecting and responding to cyber attacks every day for over 15 years. The release of M-Trends® 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks.

(more available)
Added: March 1, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. Toenhance the context within which these illicit goodsand services are obtained, abused, and ultimatelycontribute to such risks, Flashpoint analysts conducteda survey of the prices for various offerings listed forsale across the Deep & Dark Web. While analysts’findings should be interpreted as case studies andgeneral observations rather than precise statistics, thisreport can and should serve to inform the security andrisk strategies of organizations across all sectors.

(more available)
Added: February 18, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure.

(more available)
Added: February 9, 2020
image from 2019 Data Exposure Report

2019 Data Exposure Report

The 2019 Data Exposure Report is based on our survey of 1,028 information security leaders, as well as 615 business decision-makers, all with budgetary decision-making power. The report examines the role of employee actions in causing insider threat, organizational attitudes toward intellectual property and the ability of legacy data loss prevention technologies to stem insider threats.

(more available)
Added: February 6, 2020
image from Privileged Access Threat Report 2019

Privileged Access Threat Report 2019

In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks.

(more available)
Added: February 6, 2020
image from The Secure Access Threat Report 2017

The Secure Access Threat Report 2017

Bomgar outlines how to defend against security threats, showing two distinct groups of threats, prevention techniques, etc.

Added: February 6, 2020
image from A Visual Guide to Insider Threat Investigations

A Visual Guide to Insider Threat Investigations

In this eBook, they’ll cover: • The Insider Threat investigation process with security solutions like Security Information and Event Management (SIEMs) • What an investigation looks like within ObserveIT, a dedicated insider threat management platform, including: – Proactive threat hunting – Reactive alert investigations after a known incident

(more available)
Added: September 18, 2019
image from Managing the Risk of Post-breach or "Resident" Attacks

Managing the Risk of Post-breach or "Resident" Attacks

Ponemon Institute surveyed 627 IT and IT security practitioners in the United States to understand how well organizations are addressing cyber risks associated with attackers who may already be residing within the perimeter, including insiders that might act maliciously. In this study, these are referred to as “post-breach” or “resident” attackers. The findings consistently show that organizations do not fully understand the risks associated with this type of threat, are unprepared for resident attackers, and have little ability to discover and remove them.

(more available)
Added: September 18, 2019
image from The Cybersecurity Imperative: Pulse Update - Summer 2019

The Cybersecurity Imperative: Pulse Update - Summer 2019

In 2018, WSJ Pro Cybersecurity partnered with ESI ThoughtLab, a thought leadership and economic research firm, to gather data on how more than 1,300 enterprises were responding to the challenge of managing cyber risk. The study launched in late 2018 with the ground-breaking report ‘The Cybersecurity Imperative’ and continues with this pulse update report based on the findings of a new sample of companies.

(more available)
Added: September 18, 2019
image from Best Practices: Mitigating Insider Threats

Best Practices: Mitigating Insider Threats

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program.

(more available)
Added: September 18, 2019
image from Cloud Security Threat Report: Adapting to the New Reality of Evolving Cloud Threats

Cloud Security Threat Report: Adapting to the New Reality of Evolving Cloud Threats

Cloud is the center of IT and increasingly, the foundation for cyber security. Understanding how threat vectors are shifting in cloud is fundamental to making the necessary updates to your security program and strategy. Symantec’s CSTR shines a light on how to secure the digitally transformed, virtual organization of today and tomorrow.

(more available)
Added: July 10, 2019
image from Threatbusters: BitGlass' 2019 Insider Threat Report

Threatbusters: BitGlass' 2019 Insider Threat Report

Insider threats constitute a legitimate danger to enterprise security. While protecting data from malicious external actors is typically top of mind for most organizations, the fact remains that they must also defend against negligent and disgruntled insiders. To learn more about how well organizations are accomplishing this, Bitglass partnered with a leading cybersecurity community to survey IT professionals and gain unique insights about insider attacks.

(more available)
Added: April 19, 2019
image from The Cost Of Cybercrime

The Cost Of Cybercrime

The ninth annual cost of cybercrime study helps to quantify the economic cost of cyberattacks by analyzing trends in malicious activities over time.

(more available)
Added: April 4, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm’s investment approach to these technologies.

(more available)
Added: March 26, 2019
image from 2019 Endpoint Security Survey Report

2019 Endpoint Security Survey Report

The 2019 Endpoint Security Survey Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: February 17, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 12:08 UTC (build b1d7be4)