Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Insider

Below you will find reports with the tag of “Insider”

image from CISO Insights: 7 Best Practices For A Successful Insider Threat Program

CISO Insights: 7 Best Practices For A Successful Insider Threat Program

In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program.

(more available)
Added: October 24, 2018
image from Insuring The Future: 2018 State Of Cyber Resilience For Insurance

Insuring The Future: 2018 State Of Cyber Resilience For Insurance

“Across all technologies and capabilities examined in the survey, about 80 percent or more of insurance executives are “confident” or “extremely confident” about their effectiveness. That might seem reasonable given the progress, but a case can be made that leadership is overconfident. Attackers are becoming increasingly sophisticated and attacks can shut down the business or expose customer data. If about one in five attempted breaches is successful, that’s still a lot of breaches. And, given the findings that 45 percent of breaches are not detected for more than a week (9 percent require more than a month), that’s a lot of risk exposure.”

(more available)
Added: October 24, 2018
image from Phishing In The Age Of SaaS

Phishing In The Age Of SaaS

Phishing attacks have become the primary hacking method used against organizations. In the past, there was a tendency to blame the user, but attacks have evolved to appear so genuine that even the most security-savvy recipient can be fooled. Phishing attacks have recently experienced newfound success with the proliferation of SaaS in the workplace. This paper discusses what a company can do to deal with this new reality.

(more available)
Added: October 24, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it.”

(more available)
Added: October 24, 2018
image from The Powers Of Identity Governance And Privileged Access Security

The Powers Of Identity Governance And Privileged Access Security

This eBook provides information based on a 2017 survey that reveals the power of identity governance and privileged access security.

(more available)
Added: October 24, 2018
image from 2016 Cyber Security Intelligence Index

2016 Cyber Security Intelligence Index

This paper is an Analysis of cyber attack and incident data from IBM’s worldwide security services operations.

Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection.

(more available)
Added: October 23, 2018
image from Understanding The Insider Threat And How To Mitigate It

Understanding The Insider Threat And How To Mitigate It

This paper is intended to give a high-level view on the insider threat for those looking to implement a defensive programme. It considers the types of attack that may take place and some of the common weaknesses that aid insider attacks. It also covers some of the policies and controls that can be implemented to detect, deter or defend against the insider threat. This paper is intended to be a summary, however, the final section details further reading and resources that provide more in-depth information.

(more available)
Added: October 23, 2018
image from 17 Things Every CFO Should Know About The Human Side Of Cybersecurity

17 Things Every CFO Should Know About The Human Side Of Cybersecurity

This resource is designed to help you see the importance of people-focused solutions to cybersecurity risk mitigation. Here they’ve collected 17 statistics to help make the point that, “a cybersecurity budget isn’t complete until you’ve allocated money to building your human capacity to identify and respond to cybersecurity risk.”

(more available)
Added: October 22, 2018
image from 2016 Global Threat Report

2016 Global Threat Report

The Forcepoint 2016 Global Threat Report is a definitive breakdown of many of today’s most impactful cybersecurity threats with far-reaching technical, operational and cost impacts on affected organizations. Each section of this report closes with guidance from the Forcepoint Security Labs team on how to best address the outlined threat(s).

(more available)
Added: October 22, 2018
image from China Country Profile 2017

China Country Profile 2017

This paper gives a profile of China.

Added: October 22, 2018
image from Cloud Adoption and Risk Report 2016 Q4

Cloud Adoption and Risk Report 2016 Q4

In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services.

(more available)
Added: October 22, 2018
image from From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

Banking and capital markets firms have several things to be happy about in Accenture Security‘s comprehensive research study. Compared with the findings from last year’s report, the percentage of successful security breaches has decreased. The number of cybersecurity capabilities in banking increased from 15 to 19. Give this report a read.

(more available)
Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.

Added: October 22, 2018
image from Threat Monitoring Detection Response Report 2017

Threat Monitoring Detection Response Report 2017

This study is a summary of responses from over 400 cybersecurity professionals to provide a comprehensive snapshot on the evolving threat landscape, insider and external threats, preventative measures, threat monitoring and data collection, threat intelligence, threat detection, threat hunting, threat analytics, incident response, and incident recovery.

(more available)
Added: October 22, 2018
image from Bridging The Gap Between Secops Intent And Reality

Bridging The Gap Between Secops Intent And Reality

This report is based on a survey conducted from a variety of groups with regards to Secops and why are there is a gap between what it intends to do and the reality of what it is.

(more available)
Added: October 20, 2018
image from The Pressured World Of A Security Pro

The Pressured World Of A Security Pro

This is an infographic summary based on the 2017 Security Pressures report.

Added: October 20, 2018
image from Threat Visibility And Cybersecurity Management

Threat Visibility And Cybersecurity Management

This paper seeks to discuss the weaknesses of cybersecurity management.

Added: October 20, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)