Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator's Guide To Preparing For The GDPR

The Procrastinator’s Guide to Preparing for the GDPR, is an extensive guide to help you understand key requirements of the regulation and the approach you should take to address your organization’s compliance.

(more available)
Added: October 17, 2018
image from The Role of Insurance in Managing and Mitigating the Risk

The Role of Insurance in Managing and Mitigating the Risk

Cyber attacks against UK companies present a daily threat to normal UK business operations and are increasing in severity. This report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of four months of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 17, 2018
image from Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

Toolkits, Apps, And Services Used Today To Launch DDoS Attacks

This small report gives a analysis of DDoS attacks and how they are launched and deployed.

Added: October 17, 2018
image from Treacherous 12: Cloud Computing Top Threats In 2016

Treacherous 12: Cloud Computing Top Threats In 2016

While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. The Top Threats working group used these survey results alongside their expertise to craft the final 2016 report.

(more available)
Added: October 17, 2018
image from Trusted Access Report 2018

Trusted Access Report 2018

This report takes a closer look at user authentications and how users behave in phishing simulations, as well as shedding light on the security health of users’ devices used to log into enterprise applications.

(more available)
Added: October 17, 2018
image from Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

Two Years Of Pawn Storm: Examining An Increasingly Relevant Threat

This paper is exclusively dedicated to the cyber threat, Pawn Storm.

Added: October 17, 2018
image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.

Added: October 17, 2018
image from What About The Plant Floor: Six Subversive Concerns For Industrial Environments

What About The Plant Floor: Six Subversive Concerns For Industrial Environments

This paper describes six key weaknesses that an adversary can use to undermine a plant’s operation, providing real-life threat details and mitigation options.

(more available)
Added: October 17, 2018
image from 2016 Data Breach Industry Forecast

2016 Data Breach Industry Forecast

To help organizations prepare for what lies ahead and ensure incident response plans are ready for the evolving data breach environment, Experian Data Breach Resolution has outlined five predictions for what we can expect in 2016.

(more available)
Added: October 16, 2018
image from 2016 State Of Privacy & Security Awareness

2016 State Of Privacy & Security Awareness

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 16, 2018
image from 2017 Phishing Response Trends UK Region

2017 Phishing Response Trends UK Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 16, 2018
image from 2017 Quarterly Threat Report Q2

2017 Quarterly Threat Report Q2

This report takes a look at the cyber threats that took place in the 2nd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 16, 2018
image from 2018 Global Security Report

2018 Global Security Report

This annual report takes a look at the last decade of cyber security issues, including 2017, and provides some insight into the years ahead.

(more available)
Added: October 16, 2018
image from Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks

This paper seeks to show that data relating to the profiles of organizations and individuals subject to targeted attacks is amenable to study using epidemiological techniques. They design case-control studies to calculate odds ratios reflecting the degree of association between the identified risk factors and the receipt of targeted attack.

(more available)
Added: October 16, 2018
image from Buidling a Business Driven Financial SOC

Buidling a Business Driven Financial SOC

This whitepaper outlines the unique challenges that business-driven financial SOCs deal with, and provides tools and tips on how to manage and resolve these challenges.

(more available)
Added: October 16, 2018
image from Cyber Threats To The Financial Services And Insurance Industries

Cyber Threats To The Financial Services And Insurance Industries

Get a glimpse of cyber threats the financial services and insurance sectors are facing, including top malware and crimeware detected.

(more available)
Added: October 16, 2018
image from Cybercrime And Other Threats Faced By The Healthcare Industry

Cybercrime And Other Threats Faced By The Healthcare Industry

In this paper they discuss several aspects of the healthcare threat surface.

Added: October 16, 2018
image from Digging Deeper: An In Depth Analysis Of A Fast Flux Network

Digging Deeper: An In Depth Analysis Of A Fast Flux Network

This whitepaper provides some insight into a Fast Flux Network and its ability to deal with attacks.

Added: October 16, 2018
image from GTIC Monthly Threat Report February 2018

GTIC Monthly Threat Report February 2018

This monthly threat report takes a look at the month of February 2018. Specifically, it looks at how Agent Tesla works, cryptocurreny malware, ransomware’s refusal to die, and Turla APT updating their malware after public advisories.

(more available)
Added: October 16, 2018
image from Internet Crime Report 2016

Internet Crime Report 2016

The 2016 Internet _x0012_Crime Report highlights the I_x0012_3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), ransomware, tech support fraud, and extortion. In 2016, IC3 received a total of 298,728 complaints with reported losses in excess of $1.3 billion.

(more available)
Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 55
  • 56
  • 57
  • 58
  • 59
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)