Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Oracle and KPMG Cloud Threat Report 2019

Oracle and KPMG Cloud Threat Report 2019

This report examines emerging cyber security challenges and risks that businesses are facing as they embrace cloud services at an accelerating pace. The report provides leaders around the globe and across industries with important insights and recommendations for how they can ensure that cyber security is a critical business enabler. Cyber security leaders and practitioners can use this report to educate lines of business about the real security risks the cloud can present.

(more available)
Added: March 1, 2019
image from Internet Security Threat Report: Volume 24

Internet Security Threat Report: Volume 24

This annual report from Symantec offers insights into formjacking, cryptojacking, ransomware, supply chain attacks, targeted attacks, the cloud, IoT, and even discusses Election Interference. As always the facts and figures are intriguing. Read on!

(more available)
Added: February 27, 2019
image from 2018 State of Cybercrime

2018 State of Cybercrime

From July 2017 through June 2018, Secureworks CTU researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. This report offers answers and insights from their key findings. Read on to learn more.

(more available)
Added: February 27, 2019
image from Understanding The Mobile Threat Landscape In 2019

Understanding The Mobile Threat Landscape In 2019

From the report, “It should be another momentous year for mobile security, with cyber attacks growing rapidly in sophistication and distribution. This report will cover the key mobile security trends that emerged last year as well as summarize thoughts for the mobile threat landscape for the year ahead.”

(more available)
Added: February 27, 2019
image from Internet Organised Crime Threat Assessment 2018

Internet Organised Crime Threat Assessment 2018

The 2018 Internet Organised Crime Threat Assessment (IOCTA), has been and continues to be one of the flagship strategic products for Europol. It provides a unique law enforcement focused assessment of the emerging threats and key developments in the field of cybercrime over the last year.

(more available)
Added: February 27, 2019
image from Beginner's Guide to Brute Force & DDoS Attacks

Beginner's Guide to Brute Force & DDoS Attacks

This report offers advice for what to do when the barbarians are at your door…

Added: February 27, 2019
image from State Of Executive Cybersecurity Awareness

State Of Executive Cybersecurity Awareness

From the report, “Let’s face it: senior leaders at organizations across the globe are already pressed for their time and attention. Today’s changing threat landscape requires executives and managers to fundamentally rethink their approach when it comes to addressing and mitigating cyber-risk. With the growth in cloud, mobile, and IoT, combined with employee and supply chain access to critical data and intellectual property, security and privacy awareness is now front and center for executives in the fight against cyberthreats. Yet finding the time for executives to effectively educate themselves in order to prevent cyberthreats continues to be a challenge. Take a look [in the report and discover] how executives and managers across various industries compared to the general population in terms of their knowledge of cybersecurity and data privacy best practices.”

(more available)
Added: February 18, 2019
image from An Executive Summary On The State Of Privacy And Security Awareness In Government

An Executive Summary On The State Of Privacy And Security Awareness In Government

To better understand what government employees know (and don’t know) about data privacy and cybersecurity awareness, we surveyed 1,016 U.S.- based employees who work for local, state, and federal government entities. We then compared the results against a broader sample of employed U.S. adults that took the same survey, the results of which we featured in our 2017 State of Privacy and Security Awareness report.

(more available)
Added: February 18, 2019
image from Breach & Attack Simulation: Recapping 2017's Biggest Cyber Trends & Predictions For 2018

Breach & Attack Simulation: Recapping 2017's Biggest Cyber Trends & Predictions For 2018

This report takes a look at many of the cyber security events that took place in 2017 and discusses what they could mean for 2018.

(more available)
Added: February 18, 2019
image from 2018 State of Privacy and Security Awareness Report

2018 State of Privacy and Security Awareness Report

From the report, “Our State of Privacy and Security Awareness Report is back for a third year in a row, having originally been launched in 2016 due to the need to gain a better understanding of the cybersecurity knowledge of today’s workforce. Fast forward to 2018, and the need for such a resource has never been more important. Human-caused data breaches are still making headlines, and phishy emails are still letting the bad guys in. Increasingly popular cloud-storage tools are making it easier than ever to put sensitive data at risk, IOT devices are providing new inroads for the bad guys, and new breeds of malware continue to evolve on a daily basis. One thing connects these threats: the role that employees play in keeping their organizations secure. So, without further ado, we’re pleased to announce the results of the 2018 State of Privacy and Security Awareness Report.”

(more available)
Added: February 18, 2019
image from Cloud And Hybrid Environments: The State Of Security

Cloud And Hybrid Environments: The State Of Security

AlgoSec recently surveyed 450 C-level executives and senior security and network professionals to investigate the hybrid cloud security strategies of their organizations. The survey revealed that many organizations are embracing hybrid cloud as part of their enterprise infrastructure, and plan to increase their adoption of cloud platforms over the next three years. However, the majority of enterprises do have some serious security concerns and encounter significant challenges when managing security across hybrid environments, both during and after cloud migrations.

(more available)
Added: February 17, 2019
image from Today's Fraud Challenges Facing the Travel Industry

Today's Fraud Challenges Facing the Travel Industry

This report takes a deep dive into examining the types of fraud that occur in the travel industry.

Added: February 16, 2019
image from The State of Payment Processing & Fraud: 2018

The State of Payment Processing & Fraud: 2018

The State of Payment Processing & Fraud: 2018 Inaugural Survey & Report is a first-of-its kind study brought to you by Kount and The Fraud Practice. The inaugural survey reached hundreds of acquirers, processors, gateways, payment facilitators and issuers to get their take on the state of the industry and what is most critical for attracting and retaining clients and growing processing volumes.

(more available)
Added: February 16, 2019
image from The State Of Chargebacks: 2018 Report

The State Of Chargebacks: 2018 Report

The State of Chargebacks: 2018 Report, brought to you by Kount and Chargebacks911, is intended to provide an overview of the health and status of chargeback management in the Card Not Present (CNP) payments space. It includes key facts and figures about chargebacks, dispute and win rates. In addition, participating organizations shared insights about the tools, services, and solutions they employ for fraud detection and chargeback management, as well as the greatest challenges they face.

(more available)
Added: February 16, 2019
image from The Anatomy of Account Takeover Fraud

The Anatomy of Account Takeover Fraud

This report offers an inside look into how accounts are hacked and taken over.

Added: February 16, 2019
image from The State Of Manual Reviews: 2018 Report

The State Of Manual Reviews: 2018 Report

The State of Manual Reviews: 2018 Report, brought to you by Kount and Paladin Group, provides survey results about manual review trends and best practices in the card-not-present (CNP) payments environment. It includes key performance indicators (KPIs) and demographic details related to participating merchants. In addition, participants in the survey shared insights about the tools, services, and solutions they employ for their manual review process.

(more available)
Added: February 16, 2019
image from 6th Annual Mobile Payments And Fraud: 2018 Report

6th Annual Mobile Payments And Fraud: 2018 Report

From the report, “The 2018 Mobile Payments and Fraud Survey marks the sixth consecutive year of this study. This year’s report, with nearly 600 merchant respondents, is focused on understanding the growth, challenges and developments in the mobile channel. The report also set out to provide a better understanding of how the mobile market has evolved since the inaugural survey report in 2013.”

(more available)
Added: February 16, 2019
image from Insider Hacks: How To Catch And Prosecute Fraudsters

Insider Hacks: How To Catch And Prosecute Fraudsters

From the report, “Partnering with retailers for over a decade to detect and prevent online fraud has unearthed many insights about eCommerce criminals. One insight is that while detecting and preventing fraudster attacks is good, it is even better to catch and prosecute. But gathering evidence and building a case can be complex. Kount asked Skip Myers and Chad Evans to share best practices and firsthand success stories with building, submitting cases and engaging with law enforcement to not only catch fraudsters, but to bring them to justice.”

(more available)
Added: February 16, 2019
image from The Tech Needed to Power Payments and Combat Criminals

The Tech Needed to Power Payments and Combat Criminals

Retailers can’t get paid if their payment processing doesn’t work. And if a transaction proves fraudulent, a retailer not only loses the value of the sale and the merchandise, but also risks losing the loyalty of a customer who was billed incorrectly for the purchase. Here’s a look at the essential components of payment processing that every online retailer should consider—no matter their size— in order to provide both a positive customer experience and to successfully collect payment.

(more available)
Added: February 16, 2019
image from A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

A Trident of Change in Europe: Understanding DSM, PSD2 & GDPR

From the report, “The Digital Single Market, Revised Payment Services Directive and the General Data Protection Regulation are all complex and occasionally bewildering pieces of legislation, which aim to transform the European online market and improve services by promoting innovation. However, as they are yet to be fully implemented, organisations are understandably concerned about what they will look like in practice as opposed to on paper. Will global merchants from outside the region still be able to compete in Europe or will the new regulations be used as a form of protectionism? Will they fight fraud and chargebacks or unwittingly contribute to them? And how will Brexit – the unstable factor in the immediate future of the EU – impact all of this? As merchants and others wait in anticipation for the final stages of these three policy initiatives to take shape, The Chargeback Company is joined by contributors from ACI Worldwide and Kount to analyse the likely implications and opportunities for doing business in Europe from 2018.”

(more available)
Added: February 16, 2019
image from The State of CNP False Positives: 2018 Report

The State of CNP False Positives: 2018 Report

Kount and The Fraud Practice designed the State of CNP False Positives survey because false positives are one of the least, if not the least, understood aspects of risk management. While merchants tend to focus directly on chargebacks and fraud losses, false positives are another major source of lost revenue but are often underestimated if not ignored altogether.

(more available)
Added: February 16, 2019
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 16:08 UTC (build b1d7be4)