Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from 2022 Data Security Incident Response Report

2022 Data Security Incident Response Report

This is the Data Security Incident Response Report which features insight and metrics from the response to more than 1,250 incidents the firm helped client manage in 2020.

(more available)
Added: April 11, 2022
image from Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021

This is the Claroty Biannual ICS Risk & Vulnerability Report: 2H 2021. This report brings important context to the unique discipline of ICS vulnerability research and managing that risk.

(more available)
Added: April 11, 2022
image from Adversarial Threat Report

Adversarial Threat Report

This report is Meta’s quarterly adversarial threat report that provides a broad view into the risks we see worldwide and across multiple policy violations.

(more available)
Added: April 8, 2022
image from 2022 BrightCloud Threat Report

2022 BrightCloud Threat Report

This is the 2022 BrightCloud Threat Report.

Added: April 8, 2022
image from 2022 Global Mobile Threat Report

2022 Global Mobile Threat Report

A review of mobile device application security, based upon a combination of data from Zimperium’s product and suvey based results.

(more available)
Added: April 6, 2022
image from 2021 Threat Detection Report

2021 Threat Detection Report

This report is based on in-depth analysis of roughly 20,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insights into the malicious activity and techniques we observe most frequently.

(more available)
Added: April 5, 2022
image from The Size and Shape of Workforce Risk

The Size and Shape of Workforce Risk

A deep dive into the profiles of workforce members, identifying the characteristics of greater and less cyberrisk.

Added: March 9, 2022
image from Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk Report

Through a comparison of 1,000 enterprise organizations surveyed worldwide and real-world cloud use, this report uncovers the rise of Cloud-Native Breaches, disconnect between security practitioners and their leadership, and the state of multicloud adoption. Recommendations are given to defend against the new wave of Cloud-Native Breaches unique to Infrastructure-as-a-Service (IaaS) environments.

(more available)
Added: February 15, 2022
image from State of Software Security v12

State of Software Security v12

This report looks at the entire history of active applications, not just the activity associated with the application over one year. By doing so, we can view the full life cycle of applications, which results in more accurate metrics and observations. Aside from looking at the past, this report also imagines the future by considering practices that might help improve application security.

(more available)
Added: February 10, 2022
image from Cyber Signals

Cyber Signals

A cyberthreat intelligence brief informed by the latest Microsoft threat data and research. This content offers an expert perspective into the current threat landscape, discussing trending tactics, techniques and strategies used by the world’s most prolific threat actors.

(more available)
Added: February 9, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. In addition, the report offers perspectives on areas in which controls could be further improved and how money laundering techniques may evolve

(more available)
Added: January 26, 2022
image from Cybersecurity is Shifting: 8 Essential Trends for 2022

Cybersecurity is Shifting: 8 Essential Trends for 2022

The pandemic has changed everything. What strategies are CISOs and other security leaders implementing to ensure their organizations are secure in today’s uncertain environment? This report contains the 8 trends worth following to more effectively mitigate human risk in 2022.

(more available)
Added: January 12, 2022
image from Sophos 2022 Threat Report

Sophos 2022 Threat Report

Sophos’ annual threat report drawn from incident response engagements with customers.

Added: December 13, 2021
image from DomainTools Report: Fall 2021

DomainTools Report: Fall 2021

A review of domain registration, hosting, and content-related data on attack patterns and trends.

Added: December 10, 2021
image from ENISA Threat Landscape 2021

ENISA Threat Landscape 2021

This is the ninth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape that identifies prime threats, major trends observed with respect to threats, threat actors and attack techniques, and also describes relevant mitigation measures.

(more available)
Added: December 10, 2021
image from 2021 Cyber Security Threat Trends

2021 Cyber Security Threat Trends

The data used in this report comes from Cisco Umbrella, Cisco’s cloud delivered security service that includes DNS-layer security, secure web gateway, firewall, cloud access security broker (CASB) functionality, and threat intelligence.

(more available)
Added: December 9, 2021
image from The Annual Cybersecurity Behaviors and Attitudes Report 2021

The Annual Cybersecurity Behaviors and Attitudes Report 2021

This report examines cybersecurity attitudes and behaviors of the general public, shedding light on one of the most important aspects of cyber risk - the human factor. This research applies scientific rigor and robust data analysis to help academics, practitioners, and policy makers around the world better understand people-related security issues as they relate to enhancing awareness, influencing security behavior and improving security culture.

(more available)
Added: November 22, 2021
image from State of Security Within eCommerce 2021

State of Security Within eCommerce 2021

A review of trends in e-commerce security and attacks based upon a variety of sources collected via Impreva Research labs.

(more available)
Added: November 19, 2021
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from Cyber Claims Study: 2021 Report

Cyber Claims Study: 2021 Report

This annual report on trends in submitted claims in the cybersecurity insurance space. With particular focus on current trends such as ransomware and company firmographics.

(more available)
Added: October 11, 2021
image from The 2021 Ransomware Survey Report

The 2021 Ransomware Survey Report

A survey analysis of 455 business leaders on their sentiments regarding ransomware.

Added: October 2, 2021
  • ««
  • «
  • 15
  • 16
  • 17
  • 18
  • 19
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 04:08 UTC (build b1d7be4)