Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from ReliaQuest Annual Cyber-Threat Report

ReliaQuest Annual Cyber-Threat Report

This report provides strategic recommendations to bolster your security posture. But our mission extends beyond immediate threat mitigation. A preventative approach to cybersecurity—focusing on proactive measures and cost-effectiveness—embodies the ReliaQuest core principles. This report charts threat actors’ evolution, but also anticipates potential shifts in their TTPs as we look to the future. We offer a forward-looking perspective to prepare organizations for emerging challenges they are likely to face.

(more available)
Added: April 26, 2024
image from 2024 Cyber Claims Report

2024 Cyber Claims Report

Coalition’s 2024 Cyber Claims Report features data and case studies from organizations across the United States. Cyber risk is global, and we believe this report’s trends and risk mitigation strategies are applicable regardless of location. As an active partner in protecting organizations from digital risk, we’re proud to share these insights to help policyholders, brokers, and others in our industry stay informed about the ever-changing threat landscape.

(more available)
Added: April 26, 2024
image from M-Trends 2024 Special Report

M-Trends 2024 Special Report

In the M-Trends 2024 report it features data and other security metrics that readers have come to expect, highlights zero-day use by espionage and financially-motivated attackers, and dives deep into evasive actions conducted particularly by Chinese espionage groups. we share our learnings with the greater security community, building on our dedication to providing critical knowledge to those tasked with defending organizations. The information in this report has been sanitized to protect the identities of victims and their data.

(more available)
Added: April 23, 2024
image from 2021 Vulnerability Statistics Report

2021 Vulnerability Statistics Report

The Edgescan Vulnerability Stats Report aims to demonstrate the state of full stack security based on thousands of security assessments performed globally, as delivered by the Edgescan SaaS during 2020. This report has also become a reliable source for representing the global state of cyber security vulnerability management.

(more available)
Added: April 17, 2024
image from 2024 Insider Risk Investigations Report

2024 Insider Risk Investigations Report

Protecting trusted insiders (and the assets and systems they are entrusted with) against foreign influence is the ‘how to’ conversation to be having and solution to be driving for. This report is not just a platform for understanding the insider risk landscape. It is an invitation to uplift collaboration and best-practice information sharing with trusted allies to fortify the protective security resilience of our most missions critical agencies and entities.

(more available)
Added: April 16, 2024
image from 2024 Data Threat Report

2024 Data Threat Report

The 2024 Data Threat Report (DTR) analyzes how core security practices have changed in response to or in anticipation of changing threats. This report also offers perspectives on what organizations can do to leverage data assets to expand opportunities to make their businesses more agile and build trust with their customers. This report also considers both securing the use of GenAI and using GenAI to better secure the enterprise. Differing priorities from different functional leaders and external stakeholders will require security and risk management leaders to build stronger relationships.

(more available)
Added: April 16, 2024
image from The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024

The State of Email & Collaboration Security 2024 report is based on an in-depth global survey of 1,100 information technology and cybersecurity professionals. Mimecast commissioned UK-based research firm Vanson Bourne to conduct the survey, which took place during October and November 2023.Survey participants worked at organizations ranging from 250 to 500 employees to more than 10,000 employees.

(more available)
Added: April 12, 2024
image from The 2023 State of Security Leadership

The 2023 State of Security Leadership

This research demonstrates the continual progression of a cybersecurity conundrum that has become an unfortunate but permanent part of the digital environment. Progress is being made, but new fronts open up and new challenges emerge in a seemingly endless cycle. As the need for security rises to a board level concern, cyber leaders are facing more strategic issues to defend against, even while ongoing threats persist. As those security leaders stand to meet the threats, it behooves organizational leaders to provide the support and resources necessary to help enable those they must count on to keep their enterprises safe.

(more available)
Added: April 8, 2024
image from NetDiligence Cyber Claims Study 2023

NetDiligence Cyber Claims Study 2023

The NetDiligence Cyber Claims Study presents findings from a five-year dataset of over 9,000 real-world cyber insurance claims. In this spotlight, we focus on the subset of BEC incidents: 17% of claims reported (N=1,480) between 2018 and 2022. BEC starts with human error and ends with high crisis services costs. Educating and training the workforce is a continual and incremental process. Preventing BEC is the endless task of cybersecurity

(more available)
Added: April 3, 2024
image from The Identity Underground Report

The Identity Underground Report

This report is the first attempt to map out the most critical identity security weaknesses in the hybrid enterprise environment. These Identity Threat Exposures (ITEs), gathered from hundreds of live production environments, are the key weaknesses that allow attackers to access credentials, escalate privileges and move laterally, both on-prem and in the cloud.

(more available)
Added: April 3, 2024
image from Threat Landscape for Industrial Automation Systems: Statistics for H2 2023

Threat Landscape for Industrial Automation Systems: Statistics for H2 2023

In the second half of 2023, the percentage of ICS computers on which malicious objects were blocked decreased from the first half of the year. Most of the statistical indicators dropped accordingly. Yet, there are subtleties we would like to draw attention to, as they highlight dangerous spots on the cyberthreat landscape.

(more available)
Added: April 3, 2024
image from TransUnion 2024 State of Omnichannel Fraud Report

TransUnion 2024 State of Omnichannel Fraud Report

In the 2024 State of Omnichannel Fraud Report, TransUnion brings together trends, benchmarks, and identity and fraud expertise from across our organization. It provides insight to those responsible for preventing fraud and streamlining customer experiences to deliver better business outcomes. Use this report to evaluate current fraud prevention programs in the context of the broader market.

(more available)
Added: March 25, 2024
image from Black Kite Third Party Breach Report 2024

Black Kite Third Party Breach Report 2024

The report sheds light on the sectors most at risk, with technical services vendors leading the breach statistics for the fourth consecutive year. Despite this, a silver lining emerges as a significant portion of these vendors demonstrated improvements in their cyber ratings postbreach. The healthcare sector continues to bear the brunt of these incidents, reinforcing the need for heightened security measures within this critical industry.

(more available)
Added: March 25, 2024
image from 2024 Annual Report

2024 Annual Report

The report presents the industry’s most comprehensive analysis of intelligence from 2023. It covers threat actors and their playbook of targets, methods, and attacks to help you eliminate blind spots in your current security posture. groups, and more for the year ahead. Wherever you are in your threat intelligence journey, you can use this report as a roadmap. It will help you strengthen your operations, create a forward looking strategy, and protect your organization’s data, intellectual property, and brand reputation.

(more available)
Added: March 23, 2024
image from The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

Our research sheds light on a concerning trend: 90% of exposed valid secrets remain active for at least five days after the author is notified. This finding emphasizes a crucial lesson in code security: while detecting vulnerabilities is critical, the real challenge lies in remediation. Security, we believe, must be a shared responsibility across all stages of the Software Development Life Cycle (SDLC), not just the domain of specialized teams. Raising awareness about these seemingly minor lapses is essential for mitigating supply chain risks.

(more available)
Added: March 23, 2024
image from 2024 Annual State of Email Security Report

2024 Annual State of Email Security Report

In 2023, malicious email threats bypassing secure email gateways (SEGs) increased by more than 100% . In other words, your email security solutions aren’t stopping the threats you think they are. Security threats are real, they continue to grow, and they are likely to penetrate an organization through email . Organizations simply cannot settle for ‘Good Enough’ email security and sole reliance on a SEG is not enough . As we all know, it only takes one breach to damage a company’s financial status, brand reputation, and/or relationship with its employees and customers.

(more available)
Added: March 13, 2024
image from 2024 Threat Detection Report

2024 Threat Detection Report

Our sixth annual retrospective, this report is based on in-depth analysis of nearly 60,000 threats detected across our more than 1,000 customers’ endpoints, networks, cloud infrastructure, identities, and SaaS applications over the past year. This report provides you with a comprehensive view of this threat landscape, including new twists on existing adversary techniques, and the trends that our team has observed as adversaries continue to organize, commoditize, and ratchet up their cybercrime operations.

(more available)
Added: March 13, 2024
image from AI Threat Landscape Report 2024

AI Threat Landscape Report 2024

In this report, we shed light on these vulnerabilities and how they impact commercial and federal organizations today. We provide insights from a survey of IT security and data science leaders navigating these challenges. We share predictions driven by data from HiddenLayer’s experiences securing AI in enterprise environments. Lastly, we reveal cutting-edge advancements in security controls for AI in all its forms.

(more available)
Added: March 12, 2024
image from Deepwatch 2024 Annual Threat Report

Deepwatch 2024 Annual Threat Report

This report sets itself apart with our proprietary data and insights derived from comprehensive detection coverage coupled with human-led expert investigation and confirmation of threats. The data that powers Deepwatch results from thousands of expert investigations across hundreds of thousands of protected systems. This report examines the broader landscape of threats that leverage techniques and other tradecraft. We also track specific threats associating malicious or suspicious activity with a new or existing threat activity cluster, specific malware variants, abuse of legitimate tools, and known threat actors. ATI continually tracks and analyzes threats throughout the year, publishing weekly threat intelligence reports.

(more available)
Added: March 12, 2024
image from Federal Bureau of Investigation Internet Crime Report 2023

Federal Bureau of Investigation Internet Crime Report 2023

Today’s cyber landscape is threatened by a multitude of malicious actors who have the tools to conduct large-scale fraud schemes, hold our money and data for ransom, and endanger our national security. Profit-driven cybercriminals and nation-state adversaries alike have the capability to paralyze entire school systems, police departments, healthcare facilities, and individual private sector entities. The FBI continues to combat this evolving cyber threat. Our strategy focuses on building strong partnerships with the private sector; removing threats from US networks; pulling back the cloak of anonymity many of these actors hide behind; and hitting cybercriminals where it hurts: their wallets, including their virtual wallets.

(more available)
Added: March 8, 2024
image from The Future of Application Security 2024

The Future of Application Security 2024

The third annual Future of Application Security survey reveals how key stakeholders are responding to this challenge. We surveyed 1504 developers, CISOs, and AppSec managers from a broad range of industries across the US, Europe, and Asia-Pacific regions. The responsibility has shifted away from dedicated security teams and is now shared between AppSec managers and developers.

(more available)
Added: March 5, 2024
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)