Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Hacking Healthcare IT in 2016

Hacking Healthcare IT in 2016

This report begins with the following statement, “Among all of America’s critical infrastructures, the healthcare sector is the most targeted and plagued by perpetual persistent attacks from numerous unknown malicious hackers, intent on exploiting vulnerabilities in their insecure and antiquated networks in order to exfiltrate patient health records.” The paper then goes on to discuss the IT struggles of the healthcare sector.

(more available)
Added: October 18, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from How To Mitigate Five IT Problems Affecting The Financial Industry

How To Mitigate Five IT Problems Affecting The Financial Industry

Read this whitepaper to see how you can mitigate the following five financial services industry IT challenges. Minimize breaches, reduce cyber theft, use technology to improve network performance, improve compliance, and leverage technology to provide a competitive advantage.

(more available)
Added: October 18, 2018
image from Into The Web Of Profit

Into The Web Of Profit

This book provides excellent research and an in-depth study of cybercrime criminals and money.

Added: October 18, 2018
image from Mobile Data Report

Mobile Data Report

This report looks at data from the mobile estates of global asset management and investment firms; providing analysis, benchmarking and best practice guidance on keeping mobile devices secure and managing data consumption.

(more available)
Added: October 18, 2018
image from Phishing Reference Guide

Phishing Reference Guide

This very well put together report takes a look at phishing attacks and how they can be avoided.

Added: October 18, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

Here are some quick facts about this report and what they tell us about the issues that the healthcare industry as a whole needs to address: 58% of incidents involved insiders—healthcare is the only industry in which internal actors are the biggest threat to an organization. Medical device hacking may create media hype but the assets most often affected in breaches are databases and paper documents. Ransomware is the top malware variety by a wide margin. 70% of incidents involving malicious code were ransomware infections. Basic security measures are still not being implemented. Lost and stolen laptops with unencrypted PHI continue to be the cause of breach notifications.

(more available)
Added: October 18, 2018
image from Quarterly Threat Report Q1 2018

Quarterly Threat Report Q1 2018

This Quarterly report offers key takeaways from the first Quarter of 2018. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 18, 2018
image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report September 2016

SecureWorks Threat Intelligence Executive Monthly Report September 2016

This report from September 2016 takes a look at Firewall VULNS, RIG Popularity, diversified ransomware, POS System attacks, and a few other specific threats.

(more available)
Added: October 18, 2018
image from Security Bulletin 2016

Security Bulletin 2016

Drama, intrigue and exploits have plagued 2016 and, as we take stock of some of the more noteworthy stories, we once again cast our gaze forward to glean the shapes of the 2017 threat landscape. Rather than thinly-veiled vendor pitching, we hope to ground these predictions in trends we’ve observed in the course of our research and provide thought-provoking observations for researchers and visitors to the threat intelligence space alike.

(more available)
Added: October 18, 2018
image from Security Response: The Waterbug Attack Group

Security Response: The Waterbug Attack Group

This report takes a look at the Waterbug Attack Group and their impact in 2016.

Added: October 18, 2018
image from SiliVaccine: Inside North Korea's AntiVirus

SiliVaccine: Inside North Korea's AntiVirus

This article provides exclusive insight into North Korea’s Anti-Virus program.

Added: October 18, 2018
image from The Cyber Resilient Organization: Learning to Thrive against Threats

The Cyber Resilient Organization: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed 623 IT and IT security practitioners about their organizations’ approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 18, 2018
image from The Economic Impact of Cybercrime and Cyber Espionage

The Economic Impact of Cybercrime and Cyber Espionage

This report seeks to answer the following question, “Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen trillion dollar economy?””

(more available)
Added: October 18, 2018
image from Threat Landscape 2015

Threat Landscape 2015

For yet another year the 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.

(more available)
Added: October 18, 2018
image from Top 5 Data Security Threats

Top 5 Data Security Threats

This Report takes a look at the top 5 data security threats and analyzes what a company can do about them.

(more available)
Added: October 18, 2018
image from 2016 Cyber Insurance Market Trends

2016 Cyber Insurance Market Trends

A paper written about the evolution of the market for cyber insurance.

Added: October 17, 2018
image from 2017 Government Internet Security Threat Report, Volume 22

2017 Government Internet Security Threat Report, Volume 22

This is the Government focussed version of the annual 2017 Security Threat Report from Symantec.

Added: October 17, 2018
image from 2017 Phishing Response Trends US Region

2017 Phishing Response Trends US Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 17, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 53
  • 54
  • 55
  • 56
  • 57
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 04:08 UTC (build b1d7be4)