Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Integrity

Below you will find reports with the tag of “Integrity”

image from Fraud in the Wake of COVID-19: Benchmarking Report

Fraud in the Wake of COVID-19: Benchmarking Report

This report provides the results of the third study the ACFE has done on the fight against fraud in the wake of COVID-19. (more available)
Added: January 21, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years. (more available)
Added: January 21, 2021
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. (more available)
Added: December 18, 2020
image from The Hidden Costs of Cybercrime

The Hidden Costs of Cybercrime

This report looks at the costs of cybercrime, money or otherwise, and the effect it has on selected sectors. It then gives recommendations for decision makers in order to prevent cybercrime. (more available)
Added: December 18, 2020
image from Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

This report is based on a survey of 75 IT decision-makers and 500 students. It aims to look at cybersecurity in education, and why preparation for a cyber threat matters. (more available)
Added: December 18, 2020
image from Spear Phishing: Top Threats and Trends

Spear Phishing: Top Threats and Trends

This report looks at spear-phishing attacks affecting organizations today. It identifies the 13 biggest threats, and how to defend against them. (more available)
Added: December 18, 2020
image from Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

Beyond Car Hacking: The Cyber Threat Landscape for Automotive Companies

This report breaks down several of the most common and most prominent types of cyber threats that impact automobile manufacturers and retailers. (more available)
Added: December 18, 2020
image from 2020 State of Data Security Report- 10 Trends to Watch

2020 State of Data Security Report- 10 Trends to Watch

This report is based on a survey aimed at understanding how businesses keep information safe. They outline 10 data breach trends and how they have changed in 2020. (more available)
Added: December 16, 2020
image from SOTI/Security: A Year in Review

SOTI/Security: A Year in Review

Akamai’s end of year review of the key events of 2020 affecting information security. Compiles findings from other SOTI reports with additional commentary and data from the Akamai service footprint. (more available)
Added: December 9, 2020
image from Microsoft Digital Defense Report

Microsoft Digital Defense Report

This report looks at cybercrime in 2020, going into the changes in cybercrime, nationwide threats, security involving remote work, and how to improve security. (more available)
Added: December 1, 2020
image from Market Analysis: Brave the New Normal

Market Analysis: Brave the New Normal

This report is a market analysis of companies in Asia-Pacific. It aims to look at new security challenges they face due to remote work. (more available)
Added: December 1, 2020
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.
Added: December 1, 2020
image from Online Purchase Scams Report 2020

Online Purchase Scams Report 2020

This report looks at online purchase scams, going into the overall impact of them, how scammers are engaging with their targets, monetary losses associated with online purchase scams, and the overall risk of an online purchase scam. (more available)
Added: December 1, 2020
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI. (more available)
Added: November 30, 2020
image from The Great Cyber Surrender

The Great Cyber Surrender

This report looks at the scale and complexity of cyberattacks on individuals and firms. It then goes into what needs to be done to deal with the complex and evolving threat of cyber attacks. (more available)
Added: November 30, 2020
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.
Added: November 21, 2020
image from 2020 Phishing and Fraud Report

2020 Phishing and Fraud Report

The 2020 edition of this annual report reviews five years of phishing events from F5’s Security Operations Center. This data is supplemented with active and confirmed phishing sites from Webroot and darkweb market data from Vigilante for a broad view of the volume and techniques of phishing activity. (more available)
Added: November 16, 2020
image from Global Incident Response Threat Report 2020

Global Incident Response Threat Report 2020

This report paints a picture of the evolving threat landscape by discussing the impact of COVID-19 and the U.S. presidential election as well as providing practices for security teams looking to fight back. (more available)
Added: November 1, 2020
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year. (more available)
Added: November 1, 2020
image from Connected Medical Device Security: A Deep Dive into Healthcare Networks

Connected Medical Device Security: A Deep Dive into Healthcare Networks

This report analyzes the security of healthcare delivery organizations. It looks at the risks the industry faces and provides effective strategies to reduce cybersecurity risks and defend healthcare networks. (more available)
Added: October 30, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats. (more available)
Added: October 29, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 47
  • »
  • »»
© Cyentia Institute 2021
Library updated: January 27, 2021 20:05 UTC (build 7e736b2)