Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Cyber Insurance- The Market's View

Cyber Insurance- The Market's View

This global survey was carried out during the third quarter of 2019. 271 brokers and 96 underwriters – all involved in cyber insurance - shared with us their observations and views of the cyber insurance marketplace

(more available)
Added: February 6, 2020
image from 2020 Sonicwall Cyber Threat Report

2020 Sonicwall Cyber Threat Report

Sonicwall outlines the changes in the threat landscape in 2020 for companies to utilize.

Added: February 6, 2020
image from AppSec Trend Report

AppSec Trend Report

A report by DZone showing trends in the changing AppSec industry.

Added: December 2, 2019
image from Vulnerability QuickView Report Q3 2019

Vulnerability QuickView Report Q3 2019

Risk Based Security has been sharing our Vulnerability QuickView reports with the world, providing detailed analysis on the vulnerability landscape based on data from our vulnerability intelligence product, VulnDB . Continuing from our previous 2019 Mid-Year report, this edition of the QuickView delves into the months of August through October. The information collected is displayed in a series of charts depicting various groupings, classifications, insights, and comparisons of the data

(more available)
Added: November 25, 2019
image from 2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

A review of current maturity levels and practices as seen from Micro Focus’s five year history of reviewing security programs.

(more available)
Added: November 25, 2019
image from Economic Value of DNS Security

Economic Value of DNS Security

Using data from the Verizon DBIR and other sources, this report reviews the value of DNS in overall organizational security.

(more available)
Added: November 25, 2019
image from 2019 Payment Security Report

2019 Payment Security Report

The PSR has the unique role of measuring the strengths and weaknesses of the PCI DSS and tracking the sustainability of compliance. It also measures and tracks challenges associated with implementing and maintaining security controls required for PCI DSS compliance.

(more available)
Added: November 25, 2019
image from Incident Preparedness and Response Report

Incident Preparedness and Response Report

The VIPR report (Verizon Incident Preparedness and Response Report) outlines preparations and responses to data breaches. This includes 6 phases, planning and preparation, detection and validation, containment and eradication, collection and analysis, remediation and recovery, and assessment and adjustment.

(more available)
Added: October 1, 2019
image from Cloud Security Report

Cloud Security Report

A survey based report on the attitudes and beliefs of security professionals to the challenges and opportunities in cloud security.

(more available)
Added: October 1, 2019
image from The Underground Economy

The Underground Economy

This report compiles information gained by the Trustwave SpiderLabs who maintain a presence in some of the more prominent recess of the online criminal underground. The provide information on the dark web’s code of honor, reputation systems, job market, and techniques used by cybercriminals to hide their tracks from law enforcement.

(more available)
Added: September 18, 2019
image from State of Cybersecurity Report 2019

State of Cybersecurity Report 2019

From the report, “[This] report also captures the changing strategies used by attackers and highlights how organizations today are bolstering their defenses to stay one step ahead. It concludes with a peek into the cybersecurity areas that will be pertinent in the near future. We hope that you will benefit from the global and industry-specific insights available in this edition of the State of Cybersecurity Report and that together, we will be able to make our enterprises more resilient to withstand and recover from future attacks!”

(more available)
Added: September 18, 2019
image from The State of SOAR Report, 2019

The State of SOAR Report, 2019

From the report, “The challenges facing security teams are, perhaps unfortunately, common knowledge by now. A constant rise in alert volume, a stark security skills gap, piecemeal processes, and siloed tools have made security operations a tough place to be. In 2018, Demisto commissioned a large study to delve deeper into these issues, their manifestations, and possible solutions. The 2019 report broadens the perspective from Security Orchestration, Automation, and Response (SOAR) to the security incident response lifecycle. Demisto commissioned a study with 552 respondents to find out specific challenges at each stage of the incident response lifecycle, how current product capabilities help overcome these challenges, and what capabilities are missing within security products today.”

(more available)
Added: September 18, 2019
image from State of the Internet: Financial Services Attack Economy

State of the Internet: Financial Services Attack Economy

From the report, “We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.”

(more available)
Added: September 18, 2019
image from Beyond The Phish

Beyond The Phish

This report seeks to explore user knowledge of a broad range of best practices for cyber hygiene, security and compliance.

(more available)
Added: September 18, 2019
image from The Dark Side of Russia

The Dark Side of Russia

This report takes a look at how Russia’s nationalism along with new internet laws are fueling Russian cybercrime.

Added: September 18, 2019
image from Threat Insights Report - July 2019

Threat Insights Report - July 2019

The Bromium Threat Insights Report is updated on a regular basis to track notable threats and the information gleaned from them.

(more available)
Added: September 18, 2019
image from Best Practices: Mitigating Insider Threats

Best Practices: Mitigating Insider Threats

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program.

(more available)
Added: September 18, 2019
image from Fake Executive Emails, Real Financial Losses

Fake Executive Emails, Real Financial Losses

From the report, “BEC is a specific type of phishing email that operates without links and without attachments (two of the standard markers that perimeter defenses look for). However, instead of taking over a computer or stealing data, BEC hackers impersonate an executive (a known CEO, CFO or other CxO), and persuade the recipient (an employee) to perform some action – like wiring money or attaching information to an email. " Read on to learn more.

(more available)
Added: September 18, 2019
image from Reinventing Cybersecurity With Artificial Intelligence

Reinventing Cybersecurity With Artificial Intelligence

In this report they explore: • Why AI-enabled cybersecurity is increasingly necessary • How organizations are benefitting from AI in cybersecurity • Where organizations should focus their cybersecurity initiatives • Building a roadmap for implementing AI in cybersecurity

(more available)
Added: September 18, 2019
image from Retail and Hospitality Threat Trend Report

Retail and Hospitality Threat Trend Report

This report covers trends in retail and hospitality in 2019. It covers Cyber espionage that impacts hospitality, how virtual skimming threat data poses risk to payment card data, and an analysis and comparison of point-of-sale malware companies.

(more available)
Added: September 18, 2019
image from The DevSecOps Approach

The DevSecOps Approach

This report is essential reading for executives, security practitioners and development teams who want to better understand the present state of software security risk, and who seek to benchmark and improve their own organization’s performance.

(more available)
Added: September 18, 2019
  • ««
  • «
  • 24
  • 25
  • 26
  • 27
  • 28
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 08:08 UTC (build b1d7be4)