Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware defenses

Below you will find reports with the tag of “Malware defenses”

image from 2023 State of Security Report

2023 State of Security Report

The 2023 State of Security Report surveyed over 240 cybersecurity professionals from North American to reveal the key challenges cybersecurity teams are facing, how they solve cyber issues, and the security technologies organizations prioritize. (more available)
Added: January 23, 2023
image from 2021 Sysadmin Report

2021 Sysadmin Report

To celebrate Sysadmin Day 2021, we surveyed 732 sysadmins from a variety of organizations worldwide to learn how the exceptionally weird year affected them and their organizations. (more available)
Added: October 31, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from The State of Remote Work Security

The State of Remote Work Security

The State of Remote Work Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. (more available)
Added: October 24, 2022
image from 2021 BYOD Security Report

2021 BYOD Security Report

The 2021 BYOD Security Report reveals these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with remote work and enterprise mobility. (more available)
Added: October 24, 2022
image from 2021 Malware Report

2021 Malware Report

The 2021 Malware Report is to reveal the latest malware security trends, challenges, and investment priorities. Malware is continuously evolving and organizations are facing significant challenges in responding to the threat and protecting their IT environments against new types of viruses, worms, spyware, ransomware, and crypto-jacking malware. (more available)
Added: October 18, 2022
image from 2022 Ransomware & Malware Report

2022 Ransomware & Malware Report

Malware and ransomware continue to wreak havoc as some of the most destructive security threats affecting organization of all sizes, from SMBs to large enterprise and government agencies. (more available)
Added: October 18, 2022
image from 2022 Ransomware/ Malware Report

2022 Ransomware/ Malware Report

This report is based on the results of a comprehensive online survey of 225 cybersecurity professionals, to gain more insight into the latest trends, key challenges, and solutions for malware and ransomware security. (more available)
Added: October 14, 2022
image from Acronis Cyber Protection Operation Centers Report

Acronis Cyber Protection Operation Centers Report

This report represents a global outlook and is based on over 700,000 unique endpoints distributed around the world. Most of the statistics discussed focus on threats for Windows operating systems, as they are much more prevalent compared to macOS and Linux. (more available)
Added: October 11, 2022
image from 2022 State of Startup Security

2022 State of Startup Security

When it comes to security, there is a paradox. Security can enable businesses to scale and grow, but confusion around security and overly rigid practices can introduce unnecessary red tape. (more available)
Added: July 14, 2022
image from SANS 2022 Cloud Security Survey

SANS 2022 Cloud Security Survey

The goal of the SANS 2022 Cloud Security Survey is to provide additional insight into how organizations are using cloud today, the threats security teams are facing in the cloud, and what we are doing to improve security posture in the cloud, as well. (more available)
Added: June 28, 2022
image from 2022 Cyberthreat Defense Report

2022 Cyberthreat Defense Report

The CDR is the most geographically comprehensive, vendor-agnostic study of IT security decision makers and practitioners. Rather than compiling cyberthreat statistics and assessing the damage caused by data breaches, the CDR surveys the perceptions of IT security professionals, gaining insights into how they see the world. (more available)
Added: June 23, 2022
image from The Red Report 2021

The Red Report 2021

The Red Report 2021 reveals an increase in the number of average malicious actions per malware. Another key finding of the report is that T1059 Command and Scripting Interpreter is the most prevalent ATT&CK technique, utilized by a quarter of all the malware samples analyzed. (more available)
Added: May 20, 2022
image from Quarterly Threat Landscape Report Q4 2018

Quarterly Threat Landscape Report Q4 2018

This report primarily analyzes threat data from millions for Fortinet devices across the internet.
Added: May 9, 2022
image from 2020 Mobile App Threat Landscape Report

2020 Mobile App Threat Landscape Report

This report will give a snapshot of 2020’s mobile threat landscape and dive into emerging trends we anticipate carrying into 2021. (more available)
Added: April 13, 2022
image from The Size and Shape of Workforce Risk

The Size and Shape of Workforce Risk

A deep dive into the profiles of workforce members, identifying the characteristics of greater and less cyberrisk.
Added: March 9, 2022
image from Cloud and Threat Report - January 2022

Cloud and Threat Report - January 2022

Takes a look back at the top trends in cloud attacker activities and cloud data risks from 2021 compared to 2020. (more available)
Added: January 13, 2022
image from Security Outcomes Study: Endpoint Edition

Security Outcomes Study: Endpoint Edition

Endpoint security is the last line of defense. Now more than ever, effective endpoint protection is essential to the success of any cybersecurity program. (more available)
Added: May 24, 2021
image from Sunburst Backdoor - Code Overlaps with Kazuar

Sunburst Backdoor - Code Overlaps with Kazuar

This report looks at the malware used by a group called Sunburst. It gives a detailed timeline of attacks, and the code used in them. (more available)
Added: January 11, 2021
image from Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

Lessons in Cybersecurity: How Education Coped in the Shift to Distance Learning

This report is based on a survey of 75 IT decision-makers and 500 students. It aims to look at cybersecurity in education, and why preparation for a cyber threat matters. (more available)
Added: December 18, 2020
image from Cybersecurity Awareness Month Survey Report September 2020

Cybersecurity Awareness Month Survey Report September 2020

This study was conducted to better understand consumer behavior around internet-connected devices and perceptions of security. It looks into generational differences in perception and behavior changes during COVID-19. (more available)
Added: November 6, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 12
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)