Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from 2021 SOAR Report

2021 SOAR Report

The 2021 SOAR Report is based on a comprehensive survey of cybersecurity professionals to uncover the latest trends, use cases, and benefits of SOAR solutions.

(more available)
Added: October 24, 2022
image from The State of Authentication in the Finance Industry

The State of Authentication in the Finance Industry

This report shines an important spotlight on the perceptions of global financial institutions around authentication. As the study findings show, these remains much to do to close these security gaps, and traditional MFA methods are not delivering the security that we all need.

(more available)
Added: October 24, 2022
image from 2021 Threat Hunting Report

2021 Threat Hunting Report

The 2021 Threat Hunting Report explores the challenges, technology preferences, and benefits of threat hunting to gain deeper insights into the maturity and evolution of the security practice. Threat hunting continues to evolve as an innovative cybersecurity tactic that focues on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by tradition, reactive security technologies.

(more available)
Added: October 24, 2022
image from Application Protection Report 2022

Application Protection Report 2022

The goal of this report is to document the evolution of the threat landscape over the previous years so security practitioners can tune their defenses to suit. More specifically, this report is intended to clarify the relationship between target characteristics and attacker behavior so that each organization can focus on the threats most applicable to them.

(more available)
Added: October 21, 2022
image from 2021 Business Email Compromise Report

2021 Business Email Compromise Report

This report is designed to explore the state of evolving email threats and how organizations are responding to protect themselves. Business Email Compromise attacks are one of the financially most damaging cyber crimes. They typically involve phishing emails and social engineering tactics to attack organizations and trick unsuspecting employees and executives into conducting tasks under the guise of legitimate business activity, often appearing to come from a trust sender.

(more available)
Added: October 18, 2022
image from 2021 Malware Report

2021 Malware Report

The 2021 Malware Report is to reveal the latest malware security trends, challenges, and investment priorities. Malware is continuously evolving and organizations are facing significant challenges in responding to the threat and protecting their IT environments against new types of viruses, worms, spyware, ransomware, and crypto-jacking malware.

(more available)
Added: October 18, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This 2021 Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more.

(more available)
Added: October 18, 2022
image from 2021 Zero Trust Progress Report

2021 Zero Trust Progress Report

The 2021 zero trust report reveals how enterprises are implementing zero trust security in their organizations, including key drivers, adaption trends, technologies, investments, and benefits. To provide this information, we surveyed cybersecurity professionals ranging from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 18, 2022
image from 2022 Cloud Security Report

2022 Cloud Security Report

The 2022 Cloud Security Report is to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications, and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: October 18, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. This report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in 2022.

(more available)
Added: October 18, 2022
image from Ransomware Report 2022

Ransomware Report 2022

This 2022 Ransomware Report reveals the latest security trends, challenges, and investment priorities for ransomware protection, as reported by over 236 cybersecurity professionals surveyed in 2022. Ransomware attacks are on the rise and continue to wreak havoc as one of the most destructive malware threats that affect organizations of all sizes.

(more available)
Added: October 17, 2022
image from Email Security: The Confidence Game 2022

Email Security: The Confidence Game 2022

The Email Security in 2022: Confidence Game report is based on the results of a comprehensive online global survey of 294 cybersecurity professionals, conducted in Fall 2021, to gain deep insight into the latest trends, key challenges, and solutions for email security. The respondents range from technical executives to managers and IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from The State of Passwordless Security 2022

The State of Passwordless Security 2022

The 2022 State of Passwordless Security Report is based on a comprehensive survey of 411 technology professionals to explore the state of conventional and passwordless authentication, key drivers and barriers to adoption, and organizations’ technology preferences. Respondents range from technical executives to IT security practitioners, representing a cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 17, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. The respondents range from technical executives to managers and iT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: October 14, 2022
image from Threat Horizons September 2022

Threat Horizons September 2022

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on current and likely future threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from across Google’s intelligence and security teams.

(more available)
Added: October 14, 2022
image from 2022 AWS Cloud Security Report

2022 AWS Cloud Security Report

This report is based on comprehensive survey of 578 cybersecurity professionals to reveal how AWS user organizations are responding to evolving cloud security threats, and what tools and best practices cybersecurity leaders prioritize as their cloud infrastructures mature.

(more available)
Added: October 12, 2022
image from DDoS Threat Report 2021 Q3

DDoS Threat Report 2021 Q3

Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY. Over 55% of attackers focused on hitting specific service with high volumes of traffic simultaneously. Due to the dramatic increase in attack size, this shift to employing high-penetration volumetric attacks can potentially lead to additional impact to CSP networks, regionally.

(more available)
Added: October 11, 2022
image from Reining in Ransomware

Reining in Ransomware

In this report, we’ve analyzed on-the-ground evidence collected while responding to nearly 1,500 ransomware events exceeding $1 billion in ransom demands. Through it all, we’ve helped our clients manage their response, minimize costs, and maintain business operations. And we hope this report helps many other organizations and insurers do the same.

(more available)
Added: October 11, 2022
image from DDoS Threat Report FHY 2021

DDoS Threat Report FHY 2021

In the first half of 2021, we found that 99.09% of attacks were smaller than 10Gbps and 95.62% of attacks were smaller than 1Gbps, of which we believe a majority were launched using readily available and inexpensive DDoS-for-hire services.

(more available)
Added: October 11, 2022
image from Acronis Cyber Protection Operation Centers Report

Acronis Cyber Protection Operation Centers Report

This report represents a global outlook and is based on over 700,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as they are much more prevalent compared to macOS and Linux.

(more available)
Added: October 11, 2022
image from DDoS Threat Report 2020 Q2

DDoS Threat Report 2020 Q2

In this report, we’re going to discuss how bit-and-piece attacks have continued to evolve, and are able to successfully evade DDoS mitigation schemes when blended with multiple attack vectors, and the challenges that these advanced attack tactics present to the cybersecurity world.

(more available)
Added: October 11, 2022
  • ««
  • «
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 20:08 UTC (build b1d7be4)