Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Email: Click with Caution

Email: Click with Caution

This report offers insights into the 40 year history of spam. It discusses what this means for business, and how the new spam has surpassed the spam of 40 years ago.

(more available)
Added: July 10, 2019
image from 2019 Malware Report

2019 Malware Report

The 2019 Malware Report was produced by Cybersecurity Insiders and HelpSystems to reveal the latest malware security trends, challenges, and investment priorities.

(more available)
Added: July 10, 2019
image from Travel Cybersecurity Study: May 2019

Travel Cybersecurity Study: May 2019

This poll was conducted from April 23-24, 2019, among a national sample of 2201 U.S. Adults. The interviews were conducted online and the data were weighted to approximate a target sample of Adults based on age, race/ethnicity, gender, educational attainment, and region. Results from the full survey have a margin of error of plus or minus 2 percentage points.

(more available)
Added: July 10, 2019
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. That means that a user has a secret, and a centralized authority holds the same secret. When authenticating, those two secrets are compared to approve user access. If a malicious 3rd party intercepts the secret, they can impersonate the user. The bad news is that this reliance on shared secrets has kept large populations of users vulnerable to phishing, credential stuffing attacks, and password reuse while contributing to the steep rise in Account Take Over (ATO). The good news? The Digital Identity landscape is about to change very quickly.”

(more available)
Added: July 10, 2019
image from The Comprehensive Guide To Commercial Firewalls

The Comprehensive Guide To Commercial Firewalls

This e-Book offers insights into Commercial Firewalls. It explains what Firewalls are for, and they do, while also providing advice for how to use firewalls in a commercial setting.

(more available)
Added: July 10, 2019
image from State of Cybersecurity 2019: Part 2: Current Trends in Attacks, Awareness and Governance

State of Cybersecurity 2019: Part 2: Current Trends in Attacks, Awareness and Governance

State of Cybersecurity 2019 reports the results of the annual ISACA® global State of Cybersecurity Survey, conducted in November 2018. This second of two reports focuses on current trends in cybersecurity attack vectors and response methodologies, organizational governance and program management.

(more available)
Added: July 10, 2019
image from Web Attacks and Gaming Abuse

Web Attacks and Gaming Abuse

This installment of State of the Internet / Security examines credential stuffing and web application attack trends over the last 17 months, with a focus on the gaming industry. One reason gaming is so lucrative is the trend of adding easily commoditized items for gamers to consume, such as cosmetic enhancements, special weapons, or other related items. Gamers are also a niche demographic known for spending money, so their financial status makes them tempting targets. We began collecting credential abuse data at the beginning of November 2017 and chose to use the same period with our application attack data to make direct comparisons between plots easier for readers.

(more available)
Added: July 10, 2019
image from Phishing Threat & Malware Review 2019

Phishing Threat & Malware Review 2019

This report is about evolution, how phishing emails and malware are in a state of constant flux. But one thing hasn’t changed: phishing is still the #1 cyber-attack vector. The vast majority of breaches begin with malicious emails or other social engineering and most malware is delivered by email.

(more available)
Added: July 10, 2019
image from Microsoft Security Intelligence Report: Volume 24

Microsoft Security Intelligence Report: Volume 24

This report provides insights culled from a year of security data analysis and hands-on lessons learned. Data analyzed includes the 6.5 trillion threat signals that go through the Microsoft cloud every day and the research and realworld experiences from our thousands of security researchers and responders around the world. In 2018, attackers used a variety of dirty tricks, both new (coin mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, blended social and technical approaches. As defenders got smarter against ransomware, a loud and disruptive form of attack, criminals pivoted to the more “stealth”, but still profitable, coin-miners.

(more available)
Added: July 10, 2019
image from Advancing Cyber Risk Management: From Security To Resilience

Advancing Cyber Risk Management: From Security To Resilience

Since 2017, risk experts have consistently ranked large-scale cyber attacks and data fraud among the top five mostly likely risks around the world. Despite growing anxieties about cyber threats, cyber resilience strategies and investments continue to lag. Globally, the time taken to discover a data breach has considerably lowered since 2017, but organizations in the Asia-Pacific region took four months longer than the global median. Internet users are growing 10 times faster than global population, exponentially increasing the surface area of attack. For example, in 2018, the total cost of cyber crimes grew by a third compared to 2016, to $600 billion, but investments in cyber security only increased 10 percent over the same period.

(more available)
Added: July 10, 2019
image from Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface

Risk IQ offers a glimpse into the multiple attacks on IT infrastructure organizations like Wipro and several others. This report is an analysis of those campaigns, their operators, and their targets.

(more available)
Added: July 10, 2019
image from Hacker's Playbook 2nd Edition Q4 2016

Hacker's Playbook 2nd Edition Q4 2016

From the report, “How do we actually “play the hacker”? We do this by deploying simulators that play the role of a “virtual hacker” across endpoints, network and cloud, and execute breach methods from our hacker’s playbook. Our findings are incorporated in this report, and analyzed by SafeBreach Labs, with the hope that security teams can glean some interesting insights into the things not to do in their environment.”

(more available)
Added: July 10, 2019
image from Cloud Data Management Report

Cloud Data Management Report

This report explores how businesses worldwide are approaching data management, the most common challenges with backups and availability, and the lessons leaders can learn from how high-performing businesses are using data as they continue to transform.

(more available)
Added: July 10, 2019
image from Threat Insights Report: June 2019

Threat Insights Report: June 2019

Bromium Insights Report is designed to help our customers become more aware of emerging threats and trends and to equip security teams with knowledge and tools to combat today’s attacks and anticipate evolving threats to manage their security posture.

(more available)
Added: July 10, 2019
image from 2019 Trustwave Global Security Report

2019 Trustwave Global Security Report

This report promises to allow you to use the vast insights and hard data contained in the report to help bolster your security posture and better understand the nature of the threats we face today.

(more available)
Added: May 18, 2019
image from Bromium Insights Report: April 2019

Bromium Insights Report: April 2019

This report from Bromium offers insights into notable threats and events from 2019.

Added: May 18, 2019
image from The PSD2 Tracker: May 2019

The PSD2 Tracker: May 2019

This monthly report offers insights into the PDS2 regulations and news.

Added: May 18, 2019
image from The PSD2 Tracker: March 2019

The PSD2 Tracker: March 2019

This monthly report offers insight into PDS2 regulations and devleopments.

Added: May 18, 2019
image from The PSD2 Tracker: February 2019

The PSD2 Tracker: February 2019

This report offers monthly insights into the PSD2 regulations.

Added: May 18, 2019
image from Military and Security Developments Involving the People's Republic of China 2019

Military and Security Developments Involving the People's Republic of China 2019

A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2000, as Amended

Added: May 18, 2019
image from UK Cyber Survey Key Findings - General Public

UK Cyber Survey Key Findings - General Public

This report offers quantitative findings from a study of UK individuals to measure and understand awareness and attitudes towards cyber security, and related behaviors. The findings are part of a wider research project to provide insight to inform HM Government’s approach to encourage positive behavior amongst the public in protecting themselves against cyber threats.

(more available)
Added: May 3, 2019
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 08:08 UTC (build b1d7be4)