Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Cyber Security Breaches Survey 2020

Cyber Security Breaches Survey 2020

Using telephone survey of UK business and thirty in-depth interviews, this report reviews awareness and approaches to cyber security in the UK as well as the nature and impact of breaches by firm size and sector.

(more available)
Added: July 22, 2020
image from The State of K-12 Cybersecurity: 2019 Year in Review

The State of K-12 Cybersecurity: 2019 Year in Review

Using publicly available breach information, this report seeks to analyze the breaches and incidents occurring in the US K-12 educational sector.

(more available)
Added: July 22, 2020
image from Oracle and and KPMG Cloud Threat Report 2020

Oracle and and KPMG Cloud Threat Report 2020

The 2020 edition of this annual survey based report on cloud adoption, migration, and security trends. Drawn from a pool of 750 global respondents with roles in evaluatng, purchasing, and managing cybersecurity products and with a high level of familiarity of their organizaiton’s public cloud use.

(more available)
Added: July 22, 2020
image from The State of Cloud Security 2020

The State of Cloud Security 2020

A survey of over 3,500 IT managers with data and workloads in the public cloud.

Added: July 9, 2020
image from Threat Intelligence Executive Report 2020 Vol. 3

Threat Intelligence Executive Report 2020 Vol. 3

The Threat Intelligence Executive Report by Secureworks analyzes security threats and helps organizations protect their systems. During March and April of 2020, Secureworks noticed 3 developments in threat intelligence: Multiple threat actors leverage COVID-19, Remote access security is essential in the current working environment, and big breaches begin with small intrusions.

(more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. In this report, they look into Iranian espionage operations in 2020, Customized Magecart attacks, and China based threat groups targeting NGOs and Asian government networks.

(more available)
Added: July 8, 2020
image from 2020 Cloud Misconfigurations Report

2020 Cloud Misconfigurations Report

DivvyCloud researchers compiled this report to substantiate the growing trend of breaches caused by cloud misconfigurations, quantify their impact to companies and consumers around the world, and identify factors that may increase the likelihood a company will suffer such a breach.

(more available)
Added: July 6, 2020
image from 2020 Incident Response and Data Breach Report

2020 Incident Response and Data Breach Report

Drawn on over 1,000 incidents that The Crypsis Group responded to in 2019, this report looks for trends in industry and attack patterns for the past year. Primary focus areas for the report are ransomware, business email compromise (BEC), and data breaches. Also includes suggestions on defensive measures where appropriate.

(more available)
Added: July 6, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents.

(more available)
Added: July 1, 2020
image from Reimagining Customer Privacy for the Digital Age

Reimagining Customer Privacy for the Digital Age

This report by Deloitte goes in-depth into the state of consumer privacy, breaking it down into 8 categories: Association/Group Privacy, Location and Space, Personal Communication, Biological data, Images, Thoughts and Feelings, Behavior and Actions, and Traditional Identifiers. It explains each category thoroughly.

(more available)
Added: June 29, 2020
image from 2020 Cloud Security Report

2020 Cloud Security Report

The Cloud Security Report is an annual paper published by ISC(2). It goes in depth on the changing cloud environment as companies continue to rapidly migrate workloads from data centers to the cloud.

(more available)
Added: June 25, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
image from Trends in Cybersecurity Breach Disclosures

Trends in Cybersecurity Breach Disclosures

A review of cybersecurity breach trends affecting public companies from 2011 through 2019. Use the breach database compiled and maintained by Audit Analytics.

(more available)
Added: June 24, 2020
image from BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

A survey of 273 security professionals on the implications of the COVID-19 pandemic on security perceptions.

Added: June 24, 2020
image from The State of Application Security, 2020

The State of Application Security, 2020

This report from Forrester goes into the state of application security for 2020, detailing changes in the external attack methods, and changes companies should make to their application security efforts.

(more available)
Added: June 24, 2020
image from 2020 State of Application Services Report

2020 State of Application Services Report

For the sixth annual State of Application Services survey, F5 heard from nearly 2,600 respondents globally— across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. Their responses provide a unique view of the trends shaping the application landscape and how organizations around the world are transforming to meet the ever-changing demands of the digital economy.

(more available)
Added: June 23, 2020
image from The Fraud Beat 2018

The Fraud Beat 2018

This report goes in-depth on the most popular fraud techniques and how to prevent fraud attacks on your business.

Added: June 23, 2020
image from Privacy in the Wake of COVID-19

Privacy in the Wake of COVID-19

A survey of 933 respondants on changes to privacy and data protection after COVID-19 and how companies are keeping their data protected.

(more available)
Added: June 22, 2020
image from Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

A commissioned survey of 300 IT decision makers and 50 C-suite members on C-suite attitudes towards mobile device security attitudes.

(more available)
Added: June 22, 2020
image from 2020 Global Threat intelligence Report

2020 Global Threat intelligence Report

A report derived from NTT’s managed SOC service, seeking to identify modern and emerging trends observed across industries and regions.

(more available)
Added: June 21, 2020
image from The C-Suite Report: The Current State and Future State of Cybersecurity

The C-Suite Report: The Current State and Future State of Cybersecurity

This report comes from a survey conducted by WSJ Intelligence and sponsored by Forcepoint. It explores the current state of cybersecurity as well as challenges that lie between current cybersecurity systems and risks going forward.

(more available)
Added: June 21, 2020
  • ««
  • «
  • 20
  • 21
  • 22
  • 23
  • 24
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 6, 2025 08:08 UTC (build b1d7be4)