Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Insider

Below you will find reports with the tag of “Insider”

image from Global Fraud Report

Global Fraud Report

This report was based on 10 in-depth interviews and an additional online survey with 545 senior executives worldwide across multiple industries and geographies. The survey was fielded through July and August 2016. The scope of the research covers perceptions of and experiences with cyber and security risk.

(more available)
Added: October 14, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from What's Hindering Interoperability Across Healthcare Networks

What's Hindering Interoperability Across Healthcare Networks

Interoperability between healthcare networks is a major goal and a major challenge for many healthcare providers. Combining today’s advanced cyberthreats and the challenges of HIPAA compliance makes sharing PHI a daunting task for many healthcare groups. Read this paper to learn how interoperability and HIPAA compliance are achievable.

(more available)
Added: October 14, 2018
image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

This is the result of SANS 2018 Cyber Threat Intelligence Survey. The survey focuses on how organizations could collect security intelligence data from a variety of sources, and then recogniza and act up on indicators of attach and compromise scenarious in a timely manner.

(more available)
Added: October 13, 2018
image from Cyber Risk Appetite Survey January 2017

Cyber Risk Appetite Survey January 2017

The primary objective of the RSA Cyber Risk Appetite Survey is to understand the behaviors and practices of organizations in regard to cyber risk. More specifically, the report aims to calculate the risk appetites of different respondent organizations. The global research is based on responses from 272 risk and security professionals at organizations.

(more available)
Added: October 13, 2018
image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from The Cloud Threat Funnel: Suspicious User Behavior That Matters

The Cloud Threat Funnel: Suspicious User Behavior That Matters

For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. On the following pages, we’ll walk you through the CyberLab’s Cloud Threat Funnel, designed to help security teams narrow their focus onto user activities that are the most indicative of true threat.

(more available)
Added: October 13, 2018
image from Top 7 Office 365 Security Use Cases For a CASB 2016

Top 7 Office 365 Security Use Cases For a CASB 2016

This eBook discusses revelant cloud security information for those using Microsoft Office 365

Added: October 13, 2018
image from 2017 Breach Predictions Report

2017 Breach Predictions Report

Through analysis of public breach data, a useful picture of the threat landscape can be observed. Analyzing trends, it may be possible to predict the general scale of expected breaches in the near future and frame those impacts in a meaningful way for individuals. This will hopefully serve to highlight the importance of good security practices and bring attention to the “personal supply chain” problem – that the companies where individuals maintain accounts and trust with personal information are part of the attack surface they create for themselves and the risk of such behavior needs to be weighed against the benefits gained.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)