Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from Security Strategies To Prepare For 5G & IoT

Security Strategies To Prepare For 5G & IoT

In the third quarter of 2017, Heavy Reading, in conjunction with A10 Networks, undertook the creation and execution of a global survey designed to assess cloud, premises, and hybrid network security concerns and evaluate CSPs’ strategies to mitigate the risks of a threat curve on an upward trajectory. The key findings from the survey are documented in this white paper.

(more available)
Added: October 19, 2018
image from Strengthen Your Defenses Against Cybercrime

Strengthen Your Defenses Against Cybercrime

This ebook provides insight based on a survey that sought to understand the state of email cybersecurity.

Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from 2015 Internet Security Threat Report, Volume 20, Appendices

2015 Internet Security Threat Report, Volume 20, Appendices

The 2015 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. (aggregating and collecting data collected from Symantec devices and customers)

(more available)
Added: October 18, 2018
image from 2015 State Of The Phish

2015 State Of The Phish

To provide a clearer idea of where, and how, organizations make themselves most vulnerable to phishing attacks, ThreatSim has prepared this 2015 report, which pools two sources of data: 1) ThreatSim’s anonymous data aggregated across our customer base, involving millions of simulated email phishing. 2) A survey of information technology executives, administrators, and information security professionals.

(more available)
Added: October 18, 2018
image from 2017 Bitdefender Ransomware Reprot

2017 Bitdefender Ransomware Reprot

This is a solid breakdown of the Ransomware issues as seen in 2017.

Added: October 18, 2018
image from 2017 Ransomware Report

2017 Ransomware Report

From The Report, “With global ransomware damages predicted to exceed $5 billion this year, it is no surprise that ransomware is the fastest growing security threat. As this year’s global attacks have made national news, businesses of all sizes have become increasingly aware of the looming ransomware threat and the challenge of staying protected. Infected companies race the clock to minimize data loss, downtime, and reputation damage. With the seemingly endless profitability, anonymity and ease of execution it doesn’t appear cybercriminals will be turning their back on ransomware anytime soon. Companies are right to expect another year filled with attacks and new variants. The question is how can companies block these attacks before ransom is demanded, and their data along with their reputation is put at risk.”

(more available)
Added: October 18, 2018
image from Behind our Digital Doors: Cybersecurity & the Connected Home

Behind our Digital Doors: Cybersecurity & the Connected Home

In support of National Cyber Security Awareness Month (October), ESET® and the National Cyber Security Alliance (NCSA) commissioned a survey to better understand the role of cybersecurity in the American household, providing an inside-look into how it is adapting in the digital era of the data breach. Given the simultaneous rise in our number of connected devices and cyber threats, this survey underlined the importance of cybersecurity as a core commitment in our digital lives. This paper discusses the findings of that survey.

(more available)
Added: October 18, 2018
image from Business Risk Intelligence Decision Report: 2018 Mid Year Update

Business Risk Intelligence Decision Report: 2018 Mid Year Update

This report provides insight into several of the business risk factors facing organizations in 2018. It specifically reviews events from all around the globe.

(more available)
Added: October 18, 2018
image from Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

Cloudy With A Change of Breach: Forecasting Cyber Security Incidents

In this study they characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual Data Breach Investigations Reports (DBIR), can be predicted based on externally observable prop- erties of an organization’s network.

(more available)
Added: October 18, 2018
image from CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

CyberArk Global Advanced Threat Landscape Survey 2018: The Business View Of Security

What do business leaders make of security? How do they perceive its practice and importance? Where are the gaps between business and security leaders? Part two of the CyberArk Global Advanced Threat Landscape Report 2018 explores these issues via responses from individuals including IT security decision-makers and line of business owners, from organizations ranging in size from 500 employees to 5,000 or more workers.

(more available)
Added: October 18, 2018
image from DDoS Threat Report Q2 2016

DDoS Threat Report Q2 2016

This report takes a look at the DDoS threats that occurred in the second quarter of 2016.

Added: October 18, 2018
image from Espionage As A Service

Espionage As A Service

This brief takes a look at the espionage as a service industry and how it can help businesses become secure.

(more available)
Added: October 18, 2018
image from Flipping the Economics of Attacks

Flipping the Economics of Attacks

How much does it cost technically proficient adversaries to conduct successful attacks, and how much do they earn? In this report, they look at the relationships between the time spent and compensation of today’s adversaries and how organizations can thwart attacks. As revealed in this research, while some attackers may be motivated by non-pecuniary reasons, such as those that are geopolitical or reputational, an average of 69 percent of respondents say they are in it for the money.

(more available)
Added: October 18, 2018
image from Global Insurance and Regluatory Bulletin

Global Insurance and Regluatory Bulletin

This paper discusses the global regulations placed on the insurance industry. Of note, it does discuss cyber insurance in the United States.

(more available)
Added: October 18, 2018
image from Global Threat Report Q4 2017

Global Threat Report Q4 2017

This report takes a look at the mobile threat events for the last quarter of 2017.

Added: October 18, 2018
image from GTIC Monthly Threat Report July 2017

GTIC Monthly Threat Report July 2017

This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS.

(more available)
Added: October 18, 2018
  • ««
  • «
  • 52
  • 53
  • 54
  • 55
  • 56
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 04:08 UTC (build b1d7be4)