Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from State of Cybersecurity Report 2023

State of Cybersecurity Report 2023

The 5th edition of Wipro’s State of Cybersecurity Report (SOCR) offers a perspective and framework to help enterprises achieve cyber resilience. You will find a wealth of data and actionable insights covering attacks, breaches and law, along with the state of business cyber capabilities across geographies and industry sectors, plus future trends.

(more available)
Added: December 19, 2023
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

The Hiscox Cyber Readiness Report 2021 reveals that US firms are a global leader in cyber readiness, with more classified as ’cyber experts,’ (25%) compared to other countries. But there is still work to be done when it when it comes to dealing with ransomware and phishing emails, as US businesses are the most likely to pay a ransom. In this year’s report, we saw a disparity when it came to the level of cyber expertise US businesses have versus the actions they take when an attack actually occurs.

(more available)
Added: December 19, 2023
image from Cyber Readiness Report 2022

Cyber Readiness Report 2022

The Hiscox Cyber Readiness Report 2022 reveals that both the frequency and cost of cyber attacks are rising for US businesses, and the pandemic is continuing to have lasting effects on the cyber security landscape. While the US remains a global leader in cyber maturity, they are also most likely to pay a cyber-related ransom. To gauge businesses’ preparedness to combat cyber incidents and breaches, Hiscox surveyed over 5,000 professionals responsible for their company’s cyber security from the US, UK, Belgium, France, Germany, the Netherlands, Spain and Ireland. This includes key findings from over 900 professionals from the US.

(more available)
Added: December 19, 2023
image from Hiscox Cyber Readiness Report 2023

Hiscox Cyber Readiness Report 2023

The Hiscox Cyber Readiness Report 2023 reveals that small business owners are getting smarter, but so are cyber criminals. Although 63% of small businesses in the US are cyber intermediates and 4% are cyber experts, almost half (41%) experienced at least one cyber-attack during the past year. The report surveyed over 5,000 professionals responsible for their company’s cyber security strategy from the US, UK, France, Germany, Spain, Belgium, Republic of Ireland, and The Netherlands, including more than 500 US small business professionals.

(more available)
Added: December 19, 2023
image from Hacker Powered Security Report 2023

Hacker Powered Security Report 2023

The 7th annual Hacker-Powered Security Report goes deeper than ever before with customer insights, in addition to the opinions of some of the world’s top hackers. We also take a more comprehensive look at the top ten vulnerabilities and how various industries are performing when it comes to incentivizing hackers to find the vulnerabilities that are most important to them.

(more available)
Added: December 15, 2023
image from The Annual Cybersecurity Attitudes and Behaviors Report 2023

The Annual Cybersecurity Attitudes and Behaviors Report 2023

In this report, CybSafe and The National Security Alliance surveyed over 6,000 people across the United States, Canada, the United Kingdom, Germany, France, and New Zealand to get a better understanding of the security behaviors and attitudes. They asked the people about their knowledge of cybersecurity risks, their security best practices, and challenges they face in staying safe online. Cybercriminals know if they want to target an organization, they need to target its people. They believe this report will help organizations to better protect themselves and their people.

(more available)
Added: November 29, 2023
image from Resilience 2023 Claims Report

Resilience 2023 Claims Report

When you overlap Resilience’s claims data with data from ransomware incident response partner Coveware, blockchain analytics firm Chainanalysis, security partner Zscaler, and security firm Sophos, it reveals five key findings that impact both network defenders and the cyber insurance industry at large.

(more available)
Added: November 29, 2023
image from Global Threat Intelligence Report 2023

Global Threat Intelligence Report 2023

The BlackBerry Global Threat Intelligence Report has become a key reference guide for cybersecurity professionals worldwide, including CISOs and other decision makers, to keep the security community informed of the latest cybersecurity threats and challenges globally affecting their industries and platforms. This report covers threats encountered in June 2023 through August 2023. It examines the challenges faced by many industry sectors, with a focus on protecting government and public entities, risks within the healthcare sectors, safeguarding critical infrastructure, and the importance of protecting vulnerable entities within the financial sector.

(more available)
Added: November 29, 2023
image from Crimeware Report - Trends and Highlights from Q3 2023

Crimeware Report - Trends and Highlights from Q3 2023

The report explores a notable shift towards instability within the threat landscape and an increase in unnamed ransomware variants, potentially due to affiliates shifting between names to find the highest profits while reducing exposure to law enforcement. It also explores trends in ransom demands and payments across various industries. Finally, we discuss what may be coming in Q4 as the ransomware ecosystem continues to shift.

(more available)
Added: November 17, 2023
image from Threat landscape for industrial automation systems: H1 2023

Threat landscape for industrial automation systems: H1 2023

The report presents the findings of the analysis of statistical data obtained using the Kaspersky Security Network (KSN) distributed antivirus network. The data was received from those KSN users who gave their voluntary consent to have data anonymously transferred from their computers and processed for the purpose described in the KSN Agreement for the Kaspersky product installed on their computer.

(more available)
Added: November 17, 2023
image from 2023 State of Cybersecurity Automation Adoption

2023 State of Cybersecurity Automation Adoption

This is the third edition of ThreatQuotient’s annual survey of senior cybersecurity professionals, exploring the topic of cybersecurity automation adoption. Read this report to understand how CISOs and senior cybersecurity professionals are handling the incorporation of cybersecurity automation into their strategies to protect the complex, extended enterprise – and their analyst teams – from the pressures of escalating cyber threats.

(more available)
Added: November 15, 2023
image from Software Supply Chain Security Risk Report

Software Supply Chain Security Risk Report

In April 2023, ReversingLabs partnered with Dimensional Research to survey 321 security and IT professionals on their software supply chains for its report, “Software Supply Chain Security Risk Survey.” This analysis presents key findings and actionable recommendations for security organizations in four key areas: traditional applications security shortcomings, software supply chain complexity and security, security in software development and enterprise-wide security risks.

(more available)
Added: November 6, 2023
image from Q3 2023 Threat Horizons Report

Q3 2023 Threat Horizons Report

The Threat Horizons Report will continue to highlight advanced threats to the cloud, sophisticated attack campaigns, and novel techniques used to target victims in the cloud. By focusing on good cloud hygiene, defenders will raise the bar necessary for attackers to be successful while reducing the risk of becoming a victim to a common attack.

(more available)
Added: November 6, 2023
image from Cloud Detection and Response: Market Growth as an Enterprise Requirement

Cloud Detection and Response: Market Growth as an Enterprise Requirement

Increasingly dynamic cloud environments are presenting visibility challenges for security. Indeed, the majority of organizations claim that lack of access to physical networks, the dynamic nature of cloud-native applications, and elastic cloud infrastructure create blind spots, making security monitoring challenging. SOC teams need to address this cloud visibility gap by collecting, processing, monitoring, and acting upon information from an assortment of cloud security telemetry sources.

(more available)
Added: November 6, 2023
image from The 2023 State of the Internet Report

The 2023 State of the Internet Report

This year, we delve deeper into web entities, or content served over HTTP – think websites, web-based control panels, load balancers, and even APIs. Web entities have become a ubiquitous part of our daily lives, enabling us to shop, read the news, and stay in touch with loved ones. Our goal is to share our findings and analysis with the community to provide a deeper understanding of the complexities of the internet. We hope that readers can use these findings to enhance their understanding of the services that comprise the web and make more informed decisions about how to safeguard their digital assets.

(more available)
Added: November 6, 2023
image from 2023 AI Media Landscape Report

2023 AI Media Landscape Report

The 2023 AI Media Landscape Report sheds light on some of the conversation surrounding one of today’s most talked-about topics: Artificial Intelligence (AI). Through our research, we sought to understand how traditional media outlets are covering the topic of AI as well as how social media users are discussing AI, and what both reveal around public perception of AI and the brands associated with AI.

(more available)
Added: November 6, 2023
image from 2023 Identity Threat Report: The Unpatchables

2023 Identity Threat Report: The Unpatchables

The purpose of this report is to assess and summarize the current threat landscape facing organizations as a result of the digital identities that they issue to legitimate users. We called this report “The Unpatchables” because digital identities represent a source of technical risk that is impossible to completely mitigate even in theory.

(more available)
Added: November 2, 2023
image from The Telemetry Blueprint: Turning Vast Data Into Business Insights

The Telemetry Blueprint: Turning Vast Data Into Business Insights

This white paper explores the 5-step process, highlighting our findings across many data sources and rigorous testing of our telemetry pipeline. As we detail our methodology, we’ll also suggest different use cases. The goal is to showcase our journey and equip you with the tools and understanding to optimize your telemetry data.

(more available)
Added: October 26, 2023
image from Acronis Mid-Year Cyberthreats Report 2023

Acronis Mid-Year Cyberthreats Report 2023

This report covers the threat landscape, as encountered by our sensors and analysts in the first half of 2023. General malware data presented in the report is gathered from January–May of this year, and reflects threats targeting endpoints that we observed in these months. The report represents a global outlook and is based on over 1,000,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as these are much more prevalent then those targeting macOS and Linux.

(more available)
Added: October 26, 2023
image from 2023 Human Risk Review

2023 Human Risk Review

In this study on general phishing awareness, over 9,000 simulated phishing emails were sent to users who signed up in 2022. Participants were sent three simulated attacks over the course of a week- all classified as moderate in terms of complexity. The users had to identify these emails. If they clicked, they were forwarded to contextual learning resources.

(more available)
Added: October 25, 2023
image from 2023 Elastic Global Threat Report

2023 Elastic Global Threat Report

The 2023 Elastic Global Threat Report is a summary of more than a billion data points distilled down to a small number of distinct categories. We describe the tools, tactics, and procedures of threats from the perspective of endpoints and cloud infrastructure — the most common enterprise attack surfaces — so readers with varying priorities can determine the best course of action to take next.

(more available)
Added: October 19, 2023
  • ««
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 08:08 UTC (build b1d7be4)