Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Integrity

Below you will find reports with the tag of “Integrity”

image from The French Underground: Under A Shroud Of Extreme Caution

The French Underground: Under A Shroud Of Extreme Caution

If the North American underground had an alter ego, it would be the French underground. A deep dive into the North American underground1 revealed that it is a “glass tank,” open to not only the tech-savviest of hackers, but also visible to both cybercriminals and law enforcement. The French underground, meanwhile, is not only well-hidden in the Dark Web, its players also operate with extreme caution. Read this paper to find out more.

(more available)
Added: October 13, 2018
image from The Guide To Secure Mobile Gateways

The Guide To Secure Mobile Gateways

According to Statcounter, mobile data internet traffic surpassed desktop based traffic for the first time in 2016. With Gartner estimating one-third of all malware coming from mobile devices in 2019 and less than 10% of organizations implementing Mobile Threat Defense solutions1, the threat landscape for mobility is ripe for hackers. Read the report to find out more about how organizations can defend themselves against these threats.

(more available)
Added: October 13, 2018
image from Threat Summary And Year In Review Q4 2016

Threat Summary And Year In Review Q4 2016

This Quarterly report offers key takeaways from the fourth Quarter of 2016. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 13, 2018
image from Tracking Down The [A]pache Fishing Kit

Tracking Down The [A]pache Fishing Kit

In our latest research into the dark and dangerous world of phishing kits, Check Point Research and CyberInt have joined forces to show you how one of the most advanced phishing kits, the [A]pache Next Generation Advanced Phishing Kit, is currently being promoted and used on the Dark Net.

(more available)
Added: October 13, 2018
image from Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

Webroot Cyber Threats To Small and Medium Sized Businesses in 2017

The ever-changing cyber threat environment is forcing IT decision-makers (ITDMs) to re- evaluate their security strategies. How well equipped are SMBs to protect their data? How are they adapting their approaches to keep pace with a barrage of new cyber threats? To find out, Webroot commissioned a study of ITDMs in the US, UK, and Australia to evaluate the current security concerns and strategies of SMBs around the world. This report discusses the results of that survey.

(more available)
Added: October 13, 2018
image from 2015 Data Breach Reports

2015 Data Breach Reports

This report is an overwhelmingly large list and description of security breaches. It details type of industry impacted, type of attack, and types of information compromised.

(more available)
Added: October 12, 2018
image from 2016 Global Cyersecurity Assurance Report Card

2016 Global Cyersecurity Assurance Report Card

“The objective of this inaugural Tenable Network Security research study is to measure how enterprise IT security professionals view their organization’s ability to assess cybersecurity risks and to mitigate threats that can exploit those risks. In doing so, Tenable has developed the industry’s first Global Cybersecurity Assurance Report Card, which assigns indices and grades to responding organizations globally, by country, and by industry based on the responses of the security practitioners themselves.”

(more available)
Added: October 12, 2018
image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2017 Cyber Survey Report 2017

2017 Cyber Survey Report 2017

This survey report discusses the point that no company is completely safe from a catastrophic cyberattack. It tries to help ask the questions, “How concerned is your company?” and “What are you doing to prepare?”

(more available)
Added: October 12, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from 2017 Phishing Response Trends Australia Region

2017 Phishing Response Trends Australia Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 12, 2018
image from 2018 Vulnerability Statistcs Report

2018 Vulnerability Statistcs Report

This Report provides key takeaways from the vulnerability issues of 2017.

Added: October 12, 2018
image from Cyber Extortion Risk Report

Cyber Extortion Risk Report

This report looks at the costs, and the growth, of cybercrimes, based on data from five countries. It also examines the types and numbers of cyber crimes and their impacts. It also offers predictions for the future of cyber crimes.

(more available)
Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from EMV Issuance Trajectory And Impact On Account Takeover And CNP

EMV Issuance Trajectory And Impact On Account Takeover And CNP

This report is sponsored by iovation, which wanted to investigate the state of the U.S. EMV migration and the associated account takeover, CNP fraud, and application fraud trends. The research will help FI executives benchmark their EMV progress against their peers’ and better understand the rapidly shifting fraud landscape.

(more available)
Added: October 12, 2018
image from Forces Shaping The Cyber Threat Landscape For Financial Institutions

Forces Shaping The Cyber Threat Landscape For Financial Institutions

This significant WhitePaper takes a good look at what trends and developments are impacting the cyber threat landscape for specifically, financial institutions.

(more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.

Added: October 12, 2018
image from GDPR Friend Or Foe

GDPR Friend Or Foe

This white paper the explore the GDPR. The consequences of non-compliance, and how an organization can use the GDPR to re-examine and upgrade their security posture.

(more available)
Added: October 12, 2018
image from Hackerpocalypse: A Cybercrime Revelation

Hackerpocalypse: A Cybercrime Revelation

From the report, “The primary goal of our report is to spark major discussion around cybercrime — and cyber defense — from local, national, and global political and business leaders. We invite broadcasters, publishers, editors, reporters, and bloggers to borrow generously from our report in their efforts raise up cybersecurity in the public’s consciousness.”

(more available)
Added: October 12, 2018
image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
image from IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

IDEF Baseline Functional Requirements v1.0 with Supplemental Guidance

The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions widespread, trusted identity exchanges using federated methods that are secure, interoperable, privacy-enhancing and easy to use. Realization of that vision will require companies, agencies and individuals to perform at a new level. The Requirements are our first step towards that goal, by describing a set of functions that parties must be able to fulfill, and a set of criteria for assessing those capabilities.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 60
  • 61
  • 62
  • 63
  • 64
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 26, 2025 04:08 UTC (build b1d7be4)