Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Intel Sharing

Below you will find reports with the tag of “Intel Sharing”

image from Voice of a Threat Hunter

Voice of a Threat Hunter

This report helps uncover vulnerabilities missed by traditional security tools and detect unnoticed malicious activities. To understand how security professionals utilize threat hunting, we surveyed 218 security analysts to identify effective strategies, challenges, and metrics for success.

(more available)
Added: November 14, 2023
image from State of DevOps Report 2023

State of DevOps Report 2023

This year’s research explored three key outcomes and the capabilities that contribute to achieving those outcomes: Organizational performance, team performance and employee well-being. The research also explored means or performance measures that we often talk about like ends-in-themselves: software delivery performance and operational performance.

(more available)
Added: October 26, 2023
image from Global Cybersecurity Outlook 2022

Global Cybersecurity Outlook 2022

The Global Cybersecurity Outlook flagship report identifies the trends and analyzes the near-term future cybersecurity challenges. The accelerated shift to remote working during the COVID-19 pandemic coupled the recent high-profile cyberattacks have resulted in bringing cybersecurity top of mind among key decision-makers in organizations and nations.

(more available)
Added: January 19, 2023
image from 2022 Year In Review

2022 Year In Review

In a year of new and evolving cyber risks, our community banded together to protect the global financial system and the people it serves. From the latest in phishing lures to nation-state threats, from new ransomware tactics to managing supply chain risk. we focused on arming our members with the intelligence and knowledge they need to keep our sector secure and resilient.

(more available)
Added: December 21, 2022
image from SANS 2022 Cyber Threat Intelligence Survey

SANS 2022 Cyber Threat Intelligence Survey

The SANS CTI survey shows that many CTI programs can meet the challenge. While some programs are just getting started due to increased cybersecurity needs and a growing, complex threat environment brought on by the rapid shift to remote work, organizations can rely on CTI providers and information-sharing groups to fill in the gaps as their programs mature.

(more available)
Added: September 15, 2022
image from Taking control of security operations

Taking control of security operations

The threat landscape is constantly evolving- and the tools you used to protect your business yesterday certainly won’t keep you safe tomorrow. In this white paper, you’ll learn three ways an intelligent, integrated approach can streamline your security operations.

(more available)
Added: June 30, 2022
image from Quantum Dawn VI After-Action Report

Quantum Dawn VI After-Action Report

The intent of the exercise was to assess public and private sector-wide communications and information-sharing mechanisms, crisis management protocols, and decision-making, as well as legal and regulatory considerations as exercise participants responded to and recovered from significant ransomeware attacks targeting the financial sector. The scenario emphasized global cross-jurisdiction information sharing among financial firms, central banks, regulatory authorities, trade associations and information-sharing organizations.

(more available)
Added: May 31, 2022
image from Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

Follow the Money: Understanding the money laundering techniques that support large-scale cyber-heists

This report describes how money laundering is typically performed in the context of large-scale cyber heists. It illustrates key parts of the typical processes used by cyber criminals with examples to help better inform readers on areas they should focus on to better prevent, detect and respond to money laundering. In addition, the report offers perspectives on areas in which controls could be further improved and how money laundering techniques may evolve

(more available)
Added: January 26, 2022
image from Public Power Cybersecurity Scorecard 2019 Annual Report

Public Power Cybersecurity Scorecard 2019 Annual Report

This report creates an overall picture of the cybersecurity capabilities of public power utilities. Moreover, it supports the previous year’s findings and provides a consistent approach for supporting DOE’s Multiyear Plan for Energy Sector Cybersecurity.

(more available)
Added: January 14, 2022
image from Global Cybersecurity Index & Cyberwellness Profiles

Global Cybersecurity Index & Cyberwellness Profiles

The initial global cybersecurity index report. Using a survey based approach, this report attempts to create a global index for the state of cybersecurity and establish country specific wellness profiles.

(more available)
Added: August 3, 2020
image from Global Cybersecurity Index 2017

Global Cybersecurity Index 2017

A survey driven review of 25 indicators via 157 questions spanning 193 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis.

(more available)
Added: August 1, 2020
image from The 2019 Hacker Report

The 2019 Hacker Report

The third annual report from Hacker One on the state of the hacker/security testing community. Data is drawn from Hacker One’s community of bug bounty registrants and subscribing platforms.

(more available)
Added: June 23, 2020
image from 2020 SANS Cyber Threat Intelligence (CTI) Survey

2020 SANS Cyber Threat Intelligence (CTI) Survey

A lot of progress has been made in the past few years around requirements. Next steps in this area include identifying when and why to update intelligence requirements—even ad hoc adjustments can be planned for by identifying the circumstances under which they would need to be changed. It is also clear that there are numerous positive trends in the community, such as more organizations producing intelligence instead of just consuming it. But there are also many challenges, such as getting the appropriate staffing and training to conduct cyber threat intelligence. Tools and data sources are always going to be vital to the process, but the world of intelligence analysis is inherently analyst driven and a focus is rightfully placed there.

(more available)
Added: May 11, 2020
image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. The data sets were provided by the three primary platforms to serve as evidence for an investigation into the Internet Research Agency (IRA) influence operations.

(more available)
Added: March 26, 2019
image from The New Combative Role of a Cyber Security Incident Response Program

The New Combative Role of a Cyber Security Incident Response Program

This report offers insights into why a CSIRT is crucial in today’s world. It provides some helpful tips and steps that can improve any organization’s response team.

(more available)
Added: March 6, 2019
image from The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

The Value of Threat Intelligence: Annual Study of North American & United Kingdom Companies

Ponemon Institute is pleased to present The Value of Threat Intelligence: Annual Study of North American and United Kingdom Companies, sponsored by Anomali. The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: March 1, 2019
image from Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

Help America Vote Act (HAVA) Funding and Critical Infrastructure Security

This report offers insights and guides into the new Help America Vote Act.

Added: February 12, 2019
image from Reducing Phishing Risk In The SOC

Reducing Phishing Risk In The SOC

This whitepaper is intended to help firms understand how security automation can accelerate analyst response time to incoming phishing alerts and minimize the impact of these malicious attacks on their environment.

(more available)
Added: February 12, 2019
image from Report On Improving Cybersecurity In The Health Care Industry

Report On Improving Cybersecurity In The Health Care Industry

This report provides information cultivated by the Task Force, which offers the opportunity to address significant cybersecurity concerns in the health care industry.

(more available)
Added: November 24, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 20, 2025 16:09 UTC (build b1d7be4)