Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Surge in security concerns due to remote working during COVID-19 crisis

Surge in security concerns due to remote working during COVID-19 crisis

As people settle into the new way of working with many organizations working from home, it comes as no surprise that attention now turns to being productive as well as secure. In a recent survey, Barracuda found that almost half (46%) of global businesses have encountered at least one cybersecurity scare since shifting to a remote working model during the COVID-19 lockdown. What’s more, an astounding 49 percent say they expect to see a data breach or cybersecurity incident in the next month due to remote working.

(more available)
Added: May 11, 2020
image from Why consumers don’t understand card fraud…

Why consumers don’t understand card fraud…

To understand how consumers felt about card fraud against this changing landscape, we surveyed 4,000 consumers across the U.S. and the U.K. (on February 16 and 17, using Propeller Insights) to get a sense of how impacted they’d been, how concerned they were, and how they wanted their banks, financial services, providers and card issuers to respond to this growing threat.

(more available)
Added: May 11, 2020
image from 2020 Q1 Report Data Breach QuickView

2020 Q1 Report Data Breach QuickView

This report goes in depth into the overall changes in data breaches in the first part of 2020. Some highlights are that the number of publicly reported breaches decreased by 42% from 2019. and the number of records exposed grew 273% since last year.

(more available)
Added: May 11, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. It also underscores the opportunity for companies like yours to differentiate from the competition through the ways you engage with customers, with emphasis on how you identify and recognise them each time they interact with your business. Experian appreciates that many companies find it challenging to evolve traditional business models in order to meet the expectations of ‘always-on’ customers. But we also believe that customers’ identity verification and ongoing recognition (re-recognition) can be driving forces for greatly improved and more profitable customer relationships.

(more available)
Added: May 8, 2020
image from 100 Days of Coronavirus

100 Days of Coronavirus

This report focuses on the changes in security threats and the effect that COVID-19 has on the overall landscape.

Added: May 8, 2020
image from The CISO Current Report

The CISO Current Report

This document institutes the third edition of the CISO Current report and contains data gathered from direct interviews surveying almost 40 cybersecurity executives at leading enterprises.

(more available)
Added: May 8, 2020
image from 2020 Trustwave Global Security Report

2020 Trustwave Global Security Report

The 2020 Trustwave Global Security Report is an annual review of the phenomena, trends and statistics affecting computer security and worldwide safety, as observed by Trustwave systems and security analysts throughout 2019. As we enter a new deacade, we take a fresh look at the changing face of the compromise, from the ways in which increasingly sophisticated threat actors adapted in recent years to improvements in threat detection and response and how people in white hats responded.

(more available)
Added: May 8, 2020
image from Untangling the Web of Cloud Security Threats

Untangling the Web of Cloud Security Threats

As more organizations move to the cloud and public cloud platforms gain more users and offer more services, cybercriminals will find ways to launch attacks and profit from compromise. As we’ve demonstrated in this research, misconfiguration in cloud services opens an organization to risks like cryptojacking, e-skimming, and data exfiltration. Container technologies in the cloud, when exposed, also pose similar risks. Finally, mismanagement of credentials and other secrets have costs that can grow as threats move across the cloud stack.

(more available)
Added: May 8, 2020
image from Cybersecurity in Building Automation Systems (BAS)

Cybersecurity in Building Automation Systems (BAS)

This report is based off the findings of a deep analysis of vulnerabilities in BAS. The results are grouped into four areas then published. The four areas are: Analysis of the security Landscape, Discovery and responsible disclosure of previously unknown vulnerabilities, Deployment of a proof of concept malware, and Discussion on how network monitoring tools can help protect.

(more available)
Added: May 8, 2020
image from 2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

2020 User Risk Report: Exploring Vulnerability and Behavior in a People-Centric Threat Landscape

This survey of 3500 people (conducted by a 3rd party survey research company) examines attitudes and knowledge of various security concepts. The survey is mainly focused on the Western World, the US, Western Europe, and Australia, with Japan being the only Asian country included.

(more available)
Added: May 6, 2020
image from State of the Internet: Security 2019

State of the Internet: Security 2019

Akamai’s annual overview of security traffic trends for 2019.

Added: May 3, 2020
image from Global Threat Intelligence Report

Global Threat Intelligence Report

An annual review of threat traffic and patterns across geographies as seen by NTT Security.

Added: April 29, 2020
image from 2019 Phishing and Fraud Report

2019 Phishing and Fraud Report

F5’s third annual report, partnering with Webroot and the F5 SOC, on phishing and fraud trends.

Added: April 27, 2020
image from 2019 TLS Telemetry Report

2019 TLS Telemetry Report

Overview of deployment of TLS encryption in the general internet and Alex Top 1000 sites.

Added: April 17, 2020
image from Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

Dark Commerce: Exploring the Cybercrime Industry and it's Business Models

This report, the first in a series from Blueliv offering an overview of cybercrimeindustry, detailed some features of a rapidly growing cybercriminal serviceseconomy. We first covered the first elements in a process, from acquiringand preparing malicious code for use in a campaign, prior to setting upthe infrastructure to deliver the ‘product’ to its victims.

(more available)
Added: April 5, 2020
image from Double Dragon: APT41, a dual espionage and cyber crime operation

Double Dragon: APT41, a dual espionage and cyber crime operation

FireEye Threat Intelligence assesses with high confidence that APT41 is a prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity potentially outside of state control. Activity traces back to 2012 when individual members of APT41 conducted primarily financially motivated operations focused on the video game industry before expanding into likely statesponsored activity. This is remarkable because explicit financially motivated targeting is unusual among Chinese state-sponsored threat groups, and evidence suggests these two motivations were balanced concurrently from 2014 onward.

(more available)
Added: April 5, 2020
image from Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations

Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations

With this common understanding in mind, we have taken a comprehensive look at previously disclosed activity that can now be attributed to the GRU. Numerous governments, security firms, researchers, reporters, academics, and victims have released reports detailing different facets of the GRU’s activities. Our review identified more than 200 cyber incidents, spanning 15 years (2004–2019), targeting governments, the private sector, and members of civil society. These operations have discovered and disclosed secrets, defamed people, disinformed populations, and destroyed or disrupted computerized systems.

(more available)
Added: April 4, 2020
image from Q4 2019 Malware Trends

Q4 2019 Malware Trends

This report outlines happenings in malware attacks for the last 3 months of 2019. In general, it says malware attacks died down this quarter.

(more available)
Added: March 29, 2020
image from 2020 State of the Phish

2020 State of the Phish

Our sixth annual State of the Phish report again brings you critical, actionable insights into the current state of the phishing threat. You’ll learn about: • The end-user awareness and knowledge gaps that could be hurting your cybersecurity defenses The impacts information security professionals are experiencing because of phishing attacks and the ways they’re trying to combat these threats • How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure program success

(more available)
Added: March 29, 2020
image from 2019 Website Threat Research Report

2019 Website Threat Research Report

Our 2019 Threat Research Report is a deep dive into our logs, experiences, and collected analysis. It summarizes and identifies the latest tactics, techniques, and procedures seen by the Malware Research team, Vulnerability Research team, Threat Intel Research team and Remediation Groups at Sucuri/GoDaddy.

(more available)
Added: March 29, 2020
image from 2020 Global Threat Report

2020 Global Threat Report

If there’s one thing this year’s Global Threat Report really brings home, it’s that there’s never been a better time to get involved in cybersecurity. The stakes are high, and rising every day. Those that read and share this report are helping to educate themselves and others to better protect themselves and their communities, both at work and at home.

(more available)
Added: March 29, 2020
  • ««
  • «
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 00:08 UTC (build b1d7be4)