Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Quarterly Threats Report March 2018

Quarterly Threats Report March 2018

In this quarterly report, they discuss the fact that criminals have shifted their tactics and have now moved to power shifting, crypto-currency, and ransomware, as their main focus of cyberthreat.

(more available)
Added: October 16, 2018
image from Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

Ransomware What Lies Ahead?: A Comprehensive Guide to Ransomware Variants

This paper is the result of detailed research into classic and unique ransomware families. Its purpose is to provide a solid foundation for developing protective measures in your organization. Reading this paper offers a thorough understanding of the different types of ransomware, how it can be created and the course of itsevolution,especiallyasitexpandsintonewterritories such as mobile devices and IoT.

(more available)
Added: October 16, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report November 2016

SecureWorks Threat Intelligence Executive Monthly Report November 2016

This report from November 2016 takes a look at 6 different types of threat events and discusses the insights gleaned from research about those events.

(more available)
Added: October 16, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.

Added: October 16, 2018
image from Threat Report 2015

Threat Report 2015

The Proofpoint Threat Report explores threats, trends, and transformations that they see within their customer base and in the wider security marketplace.

(more available)
Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from Tracking Trends In Business Email Compromise

Tracking Trends In Business Email Compromise

This report takes a look at Business Email Compromise attacks and examines why the FBI was able to report that it has become a billion dollar industry.

(more available)
Added: October 16, 2018
image from Trusted Access Report 2017

Trusted Access Report 2017

This paper discusses the evolution of enterprise security.

Added: October 16, 2018
image from Underground Hacker Markets

Underground Hacker Markets

For our 3rd Annual Underground Hacker Markets Report, Dell SecureWorks engaged two of our top intelligence analysts from our CISO INTEL Team. The team members spend time tracking hackers on the numerous underground hacker forums and marketplaces all over the world. While much of the cybercrime hitting organizations throughout the world is the result of cooperation by hackers working outside the confines of publicly-accessible marketplaces, these underground forums provide a small window into the world cybercriminals occupy. In this report, we concentrated on marketplaces located on the Russian Underground and on English-speaking marketplaces between Q3 2015 and Q1 2016.

(more available)
Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from X-Force Threat Intelligence Report - 2016

X-Force Threat Intelligence Report - 2016

This report discusses information gleaned from the notable highlights in cyber threats during the year 2015. It studies notable incidents and targeted malware affecting geographies including Canada, Australia, the United Kingdom, France, Turkey and Japan. It also discusses the barriers that must be overcome in order to prevent cyber attacks from occurring.

(more available)
Added: October 16, 2018
image from 2015 Data Breach Industry Forecast

2015 Data Breach Industry Forecast

To help businesses understand implications of such changes and navigate the road ahead, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape. With this mindset, they also looked back at how our 2014 predictions played out.

(more available)
Added: October 15, 2018
image from 2015 Strategic Security Survey

2015 Strategic Security Survey

In this report, they: a) Discuss the assumptions shaping IT defense spending plans b) Delve into the real and intangible costs of a data breach c) Examine why malware is still the most common form of breach. d) Look at which threats on which security teams need to focus.

(more available)
Added: October 15, 2018
image from 2017 Call Center Fraud Report

2017 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 15, 2018
image from 2017 Internet Crime Report

2017 Internet Crime Report

The 2017 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion. The report also highlights the Elder Justice Initiative promoting justice for the nation’s seniors. In 2017, IC3 received a total of 301,580 complaints with reported losses exceeding $1.4 Billion.

(more available)
Added: October 15, 2018
image from 2017 Phishing Response Trends South Africa Region

2017 Phishing Response Trends South Africa Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 15, 2018
image from 2017 Quarterly Threat Report Q1

2017 Quarterly Threat Report Q1

This report takes a look at the cyber threats that took place in the 1st Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 15, 2018
image from Annual Worldwide Infrastructure Security Report, Vol 11

Annual Worldwide Infrastructure Security Report, Vol 11

The data within this document is based on the collective experiences, observations and concerns of the global operational security community. Arbor Networks has collected this data through a survey conducted in October 2015.

(more available)
Added: October 15, 2018
image from Be Compromise Ready 2017 Data Security Incident Response Report

Be Compromise Ready 2017 Data Security Incident Response Report

From the Report, “Cybersecurity carries a certain mystique. This comes from a combination of people not being “tech savvy,” sensationalized or incorrect headlines (“Guests Locked in Their Hotel Rooms by Ransomware”), superficial advice from so-called experts and technology-driven cure-alls. The reality is that if you focus on the basics, you will be better positioned to be “Compromise Ready.” Like other material risks companies face, cybersecurity readiness requires an enterprise wide approach tailored to the culture and industry of the company. There is no one-size-fits-all solution.”

(more available)
Added: October 15, 2018
image from BitSight Insights: Global View

BitSight Insights: Global View

This report will help you learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations. It is the result of studying the performance of companies per country with more than 50% of their IP space in: The United States, United Kingdom, Germany, Brazil, China and Singapore.

(more available)
Added: October 15, 2018
image from Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime

As required by General Assembly resolution 65/230, this Study has been prepared with a view to ‘examining options to strengthen existing and to propose new national and international legal or other responses to cybercrime.’ The mandate comes within the context of a number of other mandates and activities related to cybercrime and cybersecurity within the United Nations system. In this respect, the focus of the Study is limited to the crime prevention and criminal justice aspects of preventing and combating cybercrime.

(more available)
Added: October 15, 2018
  • ««
  • «
  • 56
  • 57
  • 58
  • 59
  • 60
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)