Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

Cybersecurity Insights Report Volume 1: What Every CEO Needs to Know About Cybersecurity

The inaugural report from AT&T Business. Leverages data from the AT&T network operations groups as well as outside research firms and network partners.

(more available)
Added: June 13, 2020
image from 2018 Global Security Report

2018 Global Security Report

Year end report from AppRiver using telemetry from the AppRiver security products and events observed by the AppRiver Security Analysts.

(more available)
Added: June 13, 2020
image from 2019 Global Security Report

2019 Global Security Report

A year in review report drawing on the events observed by AppRiver Security analysts and the telemetry from the AppRiver security platforms. Includes predictions for 2020.

(more available)
Added: June 13, 2020
image from 2018 Hacked Website Report

2018 Hacked Website Report

The annual report on trends in malware and hacked website from the incident response and malware research teams at GoDaddy Security /Sucuri.

(more available)
Added: June 13, 2020
image from Human Factor Report 2019

Human Factor Report 2019

An annual report derived from the Proofpoint customer base and the emails processed by the Proofpoint email security platform. Focuses on the “human factor” of organizational cyber security.

(more available)
Added: June 13, 2020
image from 2019 HIMSS Cybersecurity Survey

2019 HIMSS Cybersecurity Survey

A survey of 166 US health information security professionals. Discusses the prevalence of significant security events (primarily e-mail based), positive advances in healthcare security, the threat of complacency when managing programs, and area where there are control gaps.

(more available)
Added: June 12, 2020
image from Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

Analysis of an Attack Surface: Five Ways Hackers are Targeting Organizations

A combination of data from RiskIQ’s internet telemetry network and thought analysis, this report covers changes related to the COVID-19 pandemic, organization’s public attack surface, mobile threats, and the importance of JavaScript as an attack vector.

(more available)
Added: June 11, 2020
image from Cloud Threat Landscape Report 2020

Cloud Threat Landscape Report 2020

Using case data from IBM’s external incident response service involvement in cloud-related security incidents over 2019, this report covers threat actors, threat actions, common control weaknesses, and makes recommendations for increase cloud security postures. Additional data contributed by Intezer and DarkOwl.

(more available)
Added: June 10, 2020
image from Persistent Vulnerabilities, Their Causes and the Path Forward

Persistent Vulnerabilities, Their Causes and the Path Forward

Covers the long tail of vulnerability patching, whereby vulnerabilities that are not fixed soon after detection can linger for months or more before being addressed. Makes the case for better prioritization mechanisms.

(more available)
Added: June 5, 2020
image from 2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

2019 Application Protection Report, 2nd Edition: The Virtue of Visibility

The second annual application protection report (APR) from F5 Labs combines data from F5’s global customer base with network telemetry from Baffin Bay to catalog and analyze the major threats facing application security practitioners. Includes recommendations for appsec professionals.

(more available)
Added: June 3, 2020
image from AWS Shield: Threat Landscape Report - Q1 2020

AWS Shield: Threat Landscape Report - Q1 2020

The inaugural threat report from the AWS Shield managed security service. Primarily covers volumetric statistics seen on the AWS Shield platform.

(more available)
Added: June 1, 2020
image from 2020 Cyber Security Report

2020 Cyber Security Report

Each year, Check Point Research (CPR) reviews previous year cyber incidents to gather key insights about the global cyber threat landscape. In this 2020 Cyber Security Annual Report, the authors offer a review of 2019’s major cyber incidents, suggest predictions for 2020, and recommend best practices to help keep organizations safe from cyber attacks.

(more available)
Added: May 21, 2020
image from 2020 Data Breach Investigations Report

2020 Data Breach Investigations Report

Verizon’s 2020 edition of the keystone DBIR. Covering breaches and attack trends across the previous year.

Added: May 19, 2020
image from Protecting your personal data online at every point

Protecting your personal data online at every point

To protect the data we store on our devices and upload online, we first need to understand where the key risks may lie. This report reviews some of the main stories and tactics we have seen affecting data privacy over the past 12 months and provides advice on how individuals can keep control over their personal data at every turn.

(more available)
Added: May 18, 2020
image from Trend Micro Cloud App Security Report 2019

Trend Micro Cloud App Security Report 2019

Trend Micro looks into the email security threat landscape, looking into threat types, number of threats, etc.

Added: May 18, 2020
image from 2020 Data Security Incident Response Report

2020 Data Security Incident Response Report

The 2020 data breach report from the events managed by the BakerHosteltler incident response team. Trends, timelines, and losses are covered.

(more available)
Added: May 18, 2020
image from Global DDoS Threat Landscape 2019

Global DDoS Threat Landscape 2019

This is a report put out by Impervia based on their 2019 DDoS attack study. Their analysis of attacks is based on data from 3,643 network layer DDoS attacks on websites using Imperva services from January 1, 2019 through December 31, 2019, and on 42,390 application layer attacks on websites using Imperva services from May 1, 2019 through December 31, 2019,

(more available)
Added: May 11, 2020
image from Threat Insights Report 2020

Threat Insights Report 2020

We built our 2020 Threat Insights Report on this foundation, to help guide you in protecting against what’s to come. Because moving forward, the right combination of protections is not a difference between one cybersecurity solution or another; it’s the difference between being protected against tomorrow’s threats or becoming their prey.

(more available)
Added: May 11, 2020
image from 2020 Threat Report

2020 Threat Report

The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the interests of businesses, governments, and end-users. It delivers the combined security insights of BlackBerry, a trailblazer in the Internet of things (IoT) and mobile security, and Cylance, an early pioneer of AI-driven cybersecurity and endpoint security market disruptor, which was purchased by BlackBerry in February 2019.

(more available)
Added: May 11, 2020
image from Hook, Line, and Sinker- Why Phishing Attacks Work

Hook, Line, and Sinker- Why Phishing Attacks Work

In this report, we’ll dig deeper into the survey results and present our own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from our customers and partners, and tips on how to stay safe from phishing threats.

(more available)
Added: May 11, 2020
image from Assessing "Cyber Hygiene" in the U.S.

Assessing "Cyber Hygiene" in the U.S.

Wakefield Research partnered with Webroot to conduct an online quantitative research study among U.S. consumers to:

  • Better understand attitudes, perspectives, and behaviors related to cyber hygiene
  • Based on this data, create a risk index (“Cyber Hygiene Risk Index”) to assess the risks associated with susceptibility to cybercrime in each state, ranking the states to determine the riskiest and least risky states in the U.S.
  • Further analyze respondents’ susceptibility to risk by using a series of custom demographic and psychographic metrics to get a more nuanced understanding of what is behind cyber-hygiene levels
Added: May 11, 2020
  • ««
  • «
  • 21
  • 22
  • 23
  • 24
  • 25
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 6, 2025 08:08 UTC (build b1d7be4)