Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance.

(more available)
Added: October 14, 2018
image from Next-Gen Biometric Authentication

Next-Gen Biometric Authentication

Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch.

Added: October 14, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries.

(more available)
Added: October 14, 2018
image from Report Q1 2015 (January - March 2015)

Report Q1 2015 (January - March 2015)

A breakdown of the data, and types of, cyber attacks that occurred in the first quarter of 2015.

Added: October 14, 2018
image from Secure The Vote With Zero Trust Security

Secure The Vote With Zero Trust Security

This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.

Added: October 14, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report June 2016

SecureWorks Threat Intelligence Executive Monthly Report June 2016

This report from June 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 14, 2018
image from Southeast Asia: Cyber Threat Landscape

Southeast Asia: Cyber Threat Landscape

This report discusses trends in the cyber security environment in Southeast Asia from January to June 2015. We will review some recent cases of attempted breaches on companies and governments, and provide an update on a group we first identified in 2013 as APT.Nineblog.

(more available)
Added: October 14, 2018
image from Table Of Experts: Cybersecurity

Table Of Experts: Cybersecurity

This article asks some experts local to the Boston area about CyberSecurity. It provides for interesting discussion and insight.

Added: October 14, 2018
image from The 2016 Call Center Fraud Report

The 2016 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 14, 2018
image from The Cloud Email Security Challenge

The Cloud Email Security Challenge

This paper takes a look at how automating email security can create better security for an organization.

Added: October 14, 2018
image from The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

The Cyber Attackers' Playbook: A Look at How One Common Attack Pattern Left 225k Ukraine Residents in the Dark

In this ebook, they examine a specific cyber attack on a Ukrainian utility company in detail, and identify common steps that are used time and again during advanced attacks.

(more available)
Added: October 14, 2018
image from The Essential Guide To Securing Remote Access

The Essential Guide To Securing Remote Access

This guide will cover the different threats to each area with real-world examples, including exploits that affect remote access software and storage, and provide solutions and security best practice recommendations to help your organization protect against a data breach.

(more available)
Added: October 14, 2018
image from The Future of Cybercrime and Security

The Future of Cybercrime and Security

From the report, “This research will present some general trends in cybercrime, as well as indicating the potential global cost of malicious software use. It will discuss specific threats to financial and device-based businesses, as well as providing analyses of the current and future trends in cybercriminal activity, alongside general advice on how to prevent and/or minimise the impact of cybercrime.”

(more available)
Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from Threat Intelligence Executive Report 2017: Volume 5

Threat Intelligence Executive Report 2017: Volume 5

This Threat Report takes a look at some of the events of mid 2017. Specifically, it looks at the use of social platforms to target victims, espionage that targets law firms, weakness in business processes, and phishing.

(more available)
Added: October 14, 2018
image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
image from Using Network Analytics To Detect PowerShell Attacks

Using Network Analytics To Detect PowerShell Attacks

This report provides an analysis of Microsoft’s PowerShell language and how it has been used by cybercriminals.

Added: October 14, 2018
image from Webroot Threat Report 2017

Webroot Threat Report 2017

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year.

(more available)
Added: October 14, 2018
image from X-Force Threat Intelligence Index 2017

X-Force Threat Intelligence Index 2017

The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries.

(more available)
Added: October 14, 2018
image from 2014 Internet Crime Report

2014 Internet Crime Report

The 2014 Internet Crime Report highlights the IC3’s efforts to prevent and reduce the prevalence and impact of Internet crimes, and reveals at least two budding Internet crime trends. First, the increased use of social media has provided a quintessential goldmine of personal data for perpetrators. More victims are submitting complaints documenting how social media was utilized to perpetrate frauds, or indicating the perpetrator initiated a relationship through social engineering. Second, the emerging popularity of virtual currency has attracted perpetrators, who are capitalizing on the vulnerabilities of the digital currency systems.

(more available)
Added: October 13, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 59
  • 60
  • 61
  • 62
  • 63
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 12:08 UTC (build b1d7be4)