Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from 2016 Cyberthreat Defense Report

2016 Cyberthreat Defense Report

A survey-based report with findings in four major areas: current security posture, perceptions and concerns, current and future investments, and practices and strategies.

(more available)
Added: March 15, 2020
image from Bot Baseline: Fraud in Digital Advertising

Bot Baseline: Fraud in Digital Advertising

For the fourth time, White Ops and the ANA have partnered to measure bot fraud in the digital advertising ecosystem. Previous studies measured bot fraud in the digital advertising ecosystem in August/September 2014, August/September 2015, and November/December 2016. This one studies November/December 2019.

(more available)
Added: March 15, 2020
image from 2019 Year in Review: The ICS Landscape and Threat Activity Groups

2019 Year in Review: The ICS Landscape and Threat Activity Groups

This report anticipates activity targeting and affecting ICS to increase into 2020 and further. It expects to see more adversaries expand their focus to additional criticalinfrastructure and industrial environments, which willlikely align with activity associated with military orgeopolitical conflict. Although defenders continue to gaininsight through OT-specific detection and monitoringplatforms, it is imperative people continue to improvevisibility into activities and threats impacting criticalinfrastructure.

(more available)
Added: March 1, 2020
image from CISO Media Consumption

CISO Media Consumption

In this, our launch issue of CyberTheory, we will explore the current and future state of cybersecurity, the key issues driving the shift in the corporate board room perception of cyber-risk and add substantive analysis to what we believe are the most engaging topics in the space.

(more available)
Added: March 1, 2020
image from 2017 The Year of Internal Threats and Accidental Data Breaches

2017 The Year of Internal Threats and Accidental Data Breaches

Gemalto outlines changes to threats in 2017, including data from incidents in the year.

Added: February 18, 2020
image from Securing industrial Control Systems- 2017

Securing industrial Control Systems- 2017

We annually gather and analyze raw data from hundreds of IT and industrial control systems (ICS) security practitioners across a variety of industries, people whose work places them in positions of responsibility to identify risks and safeguard control systems and networks from malicious and accidental actions. It is our mission to turn these inputs into actionable intelligence that can be used to support new developments and address ongoing trends in the field, to inform the crucial business decisions that determine allocation of resources, prioritization of protective measures on critical assets and systems, and planning of new initiatives.

(more available)
Added: February 18, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. Toenhance the context within which these illicit goodsand services are obtained, abused, and ultimatelycontribute to such risks, Flashpoint analysts conducteda survey of the prices for various offerings listed forsale across the Deep & Dark Web. While analysts’findings should be interpreted as case studies andgeneral observations rather than precise statistics, thisreport can and should serve to inform the security andrisk strategies of organizations across all sectors.

(more available)
Added: February 18, 2020
image from 2019 Cyber Threatscape Report

2019 Cyber Threatscape Report

Accenture details trends in cyber threats in 2019. It narrows it down to five key features of the 2019 Trendscape: 1. New threats are occuring from technology evolution and disinformation. 2:Cybercriminals adapt, hustle, diversify, and are looking more like states. 3: hybrid motives pose new dangers of ransomware defense and response 4:Improved ecosystem hygiene is pushing threats to the supply chain

(more available)
Added: February 17, 2020
image from Global DDoS Threat Landscape Q4 2017

Global DDoS Threat Landscape Q4 2017

Imperva outlines trends in the DDoS threat landscape in 2017, including that the number of attacks has doubled, that crypto-currency continues to be targeted, and that persistent attacks are growing more common.

(more available)
Added: February 17, 2020
image from 2019 Internet Crime Report

2019 Internet Crime Report

This year’s Internet Crime Report highlights the IC3’s efforts to monitor trending scams such as Business Email Compromise (BEC), Ransomware, Elder Fraud, and Tech Support Fraud. As the report indicates, in 2019, IC3 received a total of 467,361 complaints with reported losses exceeding $3.5 billion. The most prevalent crime types reported were Phishing/Vishing/Smishing/Pharming, Non-Payment/Non-Delivery, Extortion, and Personal Data Breach. The top three crime types with the highest reported losses were BEC, Confidence/Romance Fraud, and Spoofing. More details on each of these scams can be found in this report.

(more available)
Added: February 17, 2020
image from Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security

Cisco 2018 Annual Cyber Security Report: At-a-Glance - Cloud Security

A focused subset of Cisco’s 2018 full Cyber Security Report, focusing on cloud security practices.

Added: February 17, 2020
image from X-Force Threat Intelligence Index

X-Force Threat Intelligence Index

X-Force Incident Response and Intelligence Services (IRIS) compiled IBM Security software and security services analyses from the past year, which show that 2019 was a year of reemerging old threats being used in new ways.

(more available)
Added: February 14, 2020
image from Cloud Threat Report: Putting the Sec in DevOps

Cloud Threat Report: Putting the Sec in DevOps

2020 edition of the Unit 42 Cloud Threat Report, ourteam of elite cloud threat researchers focused theirattention on the practices of DevOps. The research aimedto uncover where cloud vulnerabilities are surfacing.DevOps teams are shortening the time to productionusing infrastructure as code (IaC) templates. But the IaCtemplates themselves are not the issue. It’s the flawedprocess by which they are being created.

(more available)
Added: February 14, 2020
image from Cloud Adoption and Risk Report: Business Growth Edition

Cloud Adoption and Risk Report: Business Growth Edition

A survey-based review of how and why organizations are adopting cloud technologies, specifically from a business growth perspective. Makes some specific recommendations and has discussion on CASB solutions.

(more available)
Added: February 12, 2020
image from Cybercrime Tactics and Techniques: The 2019 State of Healthcare

Cybercrime Tactics and Techniques: The 2019 State of Healthcare

In this special CTNT report on healthcare, wefocus on the top threat categories and familiesthat plagued the medical industry over the lastyear, as well as the most common attack methodsused by cybercriminals to penetrate healthcaredefenses. In addition, we highlight the securitychallenges inherent to organizations, from smallprivate practices to enterprise health maintenanceorganizations (HMOs), as well as the reasons whyhackers look to infiltrate their defenses. Finally,we look ahead to future biotech innovations andthe need to consider security in their design andimplementation.

(more available)
Added: February 12, 2020
image from 2nd Annual Penetration Risk Report 2019

2nd Annual Penetration Risk Report 2019

This report covers penetration prevention in the last year. It covers changes in penetration prevention such as the levels of risk incurred by applications, the way the shift to the cloud affects risk, and how the size of the business affects risk.

(more available)
Added: February 12, 2020
image from Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

This report from Pew Research Center goes over how and where the average person’s personal information is used online. It goes over the lack of control most people feel, who collects your data, the lack of understanding people have over who uses their data, and how people think about the privacy and vulnerability of their personal data.

(more available)
Added: February 12, 2020
image from 2019 Email Threat Survey Report Europe Under Siege

2019 Email Threat Survey Report Europe Under Siege

Agari recently surveyed 305 senior European IT security professionals to better understand the region’s email threat landscape from the perspective of those fighting on the front lines against business email compromise (BEC), spear phishing, and other targeted email attacks. What emerges is a snapshot of a continent plagued by frictionless email scams that evade technical security controls and successfully hack the human psyche.

(more available)
Added: February 9, 2020
image from Cofense Annual Phishing Report 2019

Cofense Annual Phishing Report 2019

Cofence report on how phishing attempts and phishing prevention have changed in 2019.

Added: February 9, 2020
image from LexisNexis Risk Solutions Cybercrime Report

LexisNexis Risk Solutions Cybercrime Report

The LexisNexis® Risk Solutions Cybercrime Report is based on cybercrime attacks detected by the LexisNexis® Digital Identity Network® from January – June 2019, during real-time analysis. It covers the digital identity network, and attacks on “high-risk” transactions.

(more available)
Added: February 9, 2020
image from 2020 RSAS Trend Report

2020 RSAS Trend Report

Each year, industry leaders from around the world submit an application to be a speaker at RSA Conference. This year, we received 2,400 responses to our 2020 Call for Speakers. By sifting through all the entries, we were able to identify 10 trends that weaved their way through many of the submissions. Examining these trends provides a glimpse of what will be on the minds of cybersecurity professionals in 2020,

(more available)
Added: February 7, 2020
  • ««
  • «
  • 23
  • 24
  • 25
  • 26
  • 27
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 00:08 UTC (build b1d7be4)