Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Cyber Insurance and Cybersecurity: The Convergence

Cyber Insurance and Cybersecurity: The Convergence

This 81 page report first highlights a few trends shaping the cyber insurance market and profiles 35 vendors that are catering to cyber insurers, brokers, and reinsurers. It is based on over 60 Aite Group interviews conducted between January and June 2016 with cybersecurity vendors, insurers, brokers, actuarial consultants, attorneys, and insureds’ risk managers and information security officers.

(more available)
Added: October 25, 2018
image from Definitive Guide To Cloud Thread Protection

Definitive Guide To Cloud Thread Protection

In this eBook, they will discuss the state of cloud threat protection and why it needs a new approach, and take a deep dive into the underlying technologies and must-have components powering effective cloud threat protection. They will then identify the data sources needed in order to gain the type of granular visibility that can ensure successful cloud threat protection and deployment paths for enforcing safe cloud access. Next, they will outline proven best practices around threat protection being employed in real-world enterprises today.

(more available)
Added: October 25, 2018
image from Encryption -- What's Hiding In Plain Sight

Encryption -- What's Hiding In Plain Sight

The Internet has adapted to encryption at a breakneck speed. Multiple studies indicate a rapid increase of encrypted Internet traffic. Sandvine came out with a paper during February 2016 stating that 70% of the Internet traffic would be encrypted by that year’s end. By mid-2017, we can only predict that the percentage is much higher than 70%.

(more available)
Added: October 25, 2018
image from Healthcare Breach Report 2016: What a Difference a Year Makes

Healthcare Breach Report 2016: What a Difference a Year Makes

This report, answers the questions, “why are hackers now targeting healthcare data?” and, “how did they conduct large scale attacks that affected millions?” It also details how healthcare organizations can use a Cloud Access Security Broker to protect data in the cloud, enable secure BYOD and remain HIPAA compliant.

(more available)
Added: October 25, 2018
image from IT Security at SMBs: 2017 Benchmarking Survey

IT Security at SMBs: 2017 Benchmarking Survey

This report presents the results of an in-depth primary market research survey of cyber security decision-makers in small to mid-sized businesses in the United States, conducted during August and September 2017. The goal of their research was to understand how SMBs, undertake decision-making in the context of their internet security, how they evaluate security solutions, and their budgetary concerns.

(more available)
Added: October 25, 2018
image from M-Trends 2018

M-Trends 2018

In this report they look at incidents that occurred between October 2016 and September 2017.

Added: October 25, 2018
image from Malware Review 2018

Malware Review 2018

This report takes a look back at 2017 and a look forward to 2018. It focuses specifically on malware attacks.

(more available)
Added: October 25, 2018
image from Protecting Against Tomorrow's Malware Attacks Today

Protecting Against Tomorrow's Malware Attacks Today

This article from the UK discusses ways that organizations can protect themselves from future Malware attacks.

Added: October 25, 2018
image from Q2 2017 Phishing Trends And Intelligence Report

Q2 2017 Phishing Trends And Intelligence Report

The data and observations presented in this report are sourced from the continuous work PhishLabs does to fight back against phishing attacks and the threat actors behind them. The information highlighted in this report will help organizations better assess and mitigate the risk posed by modern phishing attacks.

(more available)
Added: October 25, 2018
image from Quarterly Threat Summary Q3 2016

Quarterly Threat Summary Q3 2016

This Quarterly report offers key takeaways from the third Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 25, 2018
image from SilverTerrier: Rise Of Nigerian Business Email Compromise

SilverTerrier: Rise Of Nigerian Business Email Compromise

With unique and specialized analysis, this paper discusses Nigerian cyber crime actors, their growth, collaboration, and the direction they are headed.

(more available)
Added: October 25, 2018
image from Strengthening Digital Society Against Cyber Shocks

Strengthening Digital Society Against Cyber Shocks

This report is based on the key findings from The Global State of Information Security Survey.

Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from Threat Intelligence Executive Report 2017: Volume 2

Threat Intelligence Executive Report 2017: Volume 2

This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools.

(more available)
Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from Vendor Landscape Cloud Workload Security Solutions

Vendor Landscape Cloud Workload Security Solutions

As businesses continue to adopt both infrastructure-as-a-service (iaaS) and platform -as-a-service (PaaS) cloud platforms, S&r pros struggle to protect their organization’s valuable data while minimizing the threat surface of cloud and hybrid cloud workloads. Cloud workload security (CWS) solutions provide automated and layered controls to secure configurations, network, applications, and storage of hybrid cloud hypervisors and workloads. this report provides S&r pros with an overview of the CWS vendor landscape, critical selection criteria, and key vendor differentiation.

(more available)
Added: October 25, 2018
image from 2015 Breach Preparedness and Response Study

2015 Breach Preparedness and Response Study

In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely.

(more available)
Added: October 24, 2018
image from 2015 Polish Internet Security Landscape

2015 Polish Internet Security Landscape

This is a yearly report based on the activities of CERT Polska for the year 2015. Polish authorities, well aware of the dangers, commissioned this report containing proposals for the organization of the defenses system of the syberspace of the Republic of Poland.

(more available)
Added: October 24, 2018
image from 2016 Cyber Threat Study

2016 Cyber Threat Study

This study, analyzes cyber threats from the years 2014 through 2016.

Added: October 24, 2018
image from 2016 Hacked Website Report Q2

2016 Hacked Website Report Q2

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 24, 2018
  • ««
  • «
  • 42
  • 43
  • 44
  • 45
  • 46
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)