Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Malware

Below you will find reports with the tag of “Malware”

image from 2019 Cyber Security Risk Report

2019 Cyber Security Risk Report

Aon’s Cyber Solutions explores eight specific risks that organizations may face in 2019 no matter where they are on their digital journey.

(more available)
Added: February 27, 2019
image from Breach & Attack Simulation: Recapping The Largest Cyber Trends of 2018 & Predictions For 2019

Breach & Attack Simulation: Recapping The Largest Cyber Trends of 2018 & Predictions For 2019

This report analyzes many of the cyber security situations from 2018 and offers some predictions for 2019.

Added: February 18, 2019
image from State Of Executive Cybersecurity Awareness

State Of Executive Cybersecurity Awareness

From the report, “Let’s face it: senior leaders at organizations across the globe are already pressed for their time and attention. Today’s changing threat landscape requires executives and managers to fundamentally rethink their approach when it comes to addressing and mitigating cyber-risk. With the growth in cloud, mobile, and IoT, combined with employee and supply chain access to critical data and intellectual property, security and privacy awareness is now front and center for executives in the fight against cyberthreats. Yet finding the time for executives to effectively educate themselves in order to prevent cyberthreats continues to be a challenge. Take a look [in the report and discover] how executives and managers across various industries compared to the general population in terms of their knowledge of cybersecurity and data privacy best practices.”

(more available)
Added: February 18, 2019
image from The 2017 State Of The Firewall

The 2017 State Of The Firewall

FireMon is proud to present its 3rd Annual State of the Firewall Report based on 437 survey responses collected between November 16, 2016 and December 6, 2016. Respondents included IT security practitioners representing a range of professional roles, organization sizes and industry verticals. Survey participants were asked 26 questions about their current firewall infrastructure and management challenges as well as questions about adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and Internet of Things (IoT).

(more available)
Added: February 18, 2019
image from 2016 State of the Firewall Report

2016 State of the Firewall Report

FireMon is proud to present its 2nd Annual State of the Firewall Report based on a November 2015 survey of 600 IT security practitioners, representing a range of professional roles, organization sizes and industry verticals. Survey participants were asked 21 questions about their current firewall infrastructure and management challenges as well as questions about adoption and impact of emerging technologies such as NGFW, SDN and cloud. When compared with results from the 2015 study, the responses revealed three trends that this report will explore further: 1) Firewalls remain an extremely valuable part of the network security infrastructure; 2) Next-generation firewalls continue to see broad adoption, adding complexity to security management; and 3) Awareness around SDN and its impact on network security has increased.

(more available)
Added: February 18, 2019
image from An Executive Summary On The State Of Privacy And Security Awareness In Government

An Executive Summary On The State Of Privacy And Security Awareness In Government

To better understand what government employees know (and don’t know) about data privacy and cybersecurity awareness, we surveyed 1,016 U.S.- based employees who work for local, state, and federal government entities. We then compared the results against a broader sample of employed U.S. adults that took the same survey, the results of which we featured in our 2017 State of Privacy and Security Awareness report.

(more available)
Added: February 18, 2019
image from Breach & Attack Simulation: Recapping 2017's Biggest Cyber Trends & Predictions For 2018

Breach & Attack Simulation: Recapping 2017's Biggest Cyber Trends & Predictions For 2018

This report takes a look at many of the cyber security events that took place in 2017 and discusses what they could mean for 2018.

(more available)
Added: February 18, 2019
image from 2018 Application Security Report

2018 Application Security Report

From the report, “Business applications are critical business resources for companies of all sizes — and they’re increasingly under attack. To gain deeper insights into the state of application security, Cybersecurity Insiders conducted an in-depth study in partnership with the 400,000 member Information Security Community on LinkedIn. This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.”

(more available)
Added: February 18, 2019
image from 2018 State of Privacy and Security Awareness Report

2018 State of Privacy and Security Awareness Report

From the report, “Our State of Privacy and Security Awareness Report is back for a third year in a row, having originally been launched in 2016 due to the need to gain a better understanding of the cybersecurity knowledge of today’s workforce. Fast forward to 2018, and the need for such a resource has never been more important. Human-caused data breaches are still making headlines, and phishy emails are still letting the bad guys in. Increasingly popular cloud-storage tools are making it easier than ever to put sensitive data at risk, IOT devices are providing new inroads for the bad guys, and new breeds of malware continue to evolve on a daily basis. One thing connects these threats: the role that employees play in keeping their organizations secure. So, without further ado, we’re pleased to announce the results of the 2018 State of Privacy and Security Awareness Report.”

(more available)
Added: February 18, 2019
image from Life Inside The Perimeter: Understanding The Modern CISO

Life Inside The Perimeter: Understanding The Modern CISO

Nominet commissioned Osterman Research to conduct a survey of 408 CISOs overseeing security for organisations with a mean average of 8,942 employees. This comprises 207 companies in the USA and 201 companies in the UK, spread across a range of sectors. The objective was to collect and analyse a large enough dataset to make valid conclusions into the opinions, behaviours and mindset of those making cyber security decisions at large organisations.

(more available)
Added: February 17, 2019
image from Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

Beyond Uncle Sam: Analyzing The Security Posture Of U.S. Government Contractors And Subcontrators

From the report, “A growing list of contractors and subcontractors have disclosed that they have been victims of data breaches resulting in the compromise of sensitive government information. In response, U.S. federal agencies have or are considering expanding cybersecurity requirements for their contractor base and adopting best practices for evaluating and monitoring those entities. In a recent study, BitSight found a large gap in the security posture between financial organizations and their third parties. This BitSight Insights report explores a similar question: what is the cybersecurity performance of U.S. federal contractors, and how does that compare to the performance of U.S. federal agencies?”

(more available)
Added: February 17, 2019
image from How Secure Are America's Largest Business Partners

How Secure Are America's Largest Business Partners

A review of the observed (externally facing) security practices of the Fortune 1000 firms.

Added: February 17, 2019
image from 2019 Endpoint Security Survey Report

2019 Endpoint Security Survey Report

The 2019 Endpoint Security Survey Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: February 17, 2019
image from Lloyd's City Risk Index: Middle East and Africa

Lloyd's City Risk Index: Middle East and Africa

This paper provides the Middle East and African insights from the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Lloyd's City Risk Index: Latin America

Lloyd's City Risk Index: Latin America

This is the Latin American focussed section of the Lloyd’s City Risk Index.

Added: February 13, 2019
image from Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

From the report, “The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. In the insurance sector, particularly, digital transformation is driven by new competitive threats, ongoing cost pressures, aging technology and increasing regulatory requirements. Put all together, there is a huge opportunity to modernize, to create new business models, acquire customers on new channels and create competitive and compelling customer experiences. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from High Score: Set A Revenue High Score By Defeating Video Game Fraud

High Score: Set A Revenue High Score By Defeating Video Game Fraud

From the report, “Each marketplace has to approve each game being sold, which gives your company credibility. Consumers also have the ability to rate the games with reviews in order to warn others about a game or a developer. Adding the consumer reviews is a layer of credibility for your game, as long as the reviews are positive. Being able to sell games directly online is great for merchants, but also opens them up to the possibility of fraud and chargebacks.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Third Quarter 2016

Global Fraud Attack Index: Third Quarter 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter, we are monitoring fraud attempts, reflected as a percent of U.S. sales transactions , on U.S. merchant websites. How big is the storm? Where is it? How is it changing? Read on to find out. For each of the Index editions in 2016, we are using the fraud rates observed in 2015 as a benchmark for comparing the state of fraud each quarter.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Second Quarter 2016

Global Fraud Attack Index: Second Quarter 2016

Forter and PYMNTS.com partnered together to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter we will monitor how fraud attempts, reflected as a percent of U.S. sales transactions, on U.S. merchant websites are trending. Up? Down? Stable? Time to panic? Hopefully not.

(more available)
Added: February 13, 2019
image from The Dawn Of Machine Learning For Banking And Payments

The Dawn Of Machine Learning For Banking And Payments

From the report, “The advent of big data happened to coincide with the advent of better computing, better algorithms, and new AI-focused organizations, allowing us to take this data and turn it into something even better: meaning. This brings us to machine learning. Later in this guide, we’ll look at how machine learning works and how it can work for you. But first, let’s take a closer look at all the ingredients that got us here.” Read on to learn more.

(more available)
Added: February 13, 2019
image from Bashe Attack: Global Infection By Contagious Malware

Bashe Attack: Global Infection By Contagious Malware

This report explores how a ransomware attack might take place and what the impacts would be on governments, businesses, and the insurance sector. In the scenario, the malware enters company networks through a malicious email, which, once opened, encrypts all the data on every device connected to the network. The email is forwarded to all contacts automatically to infect the greatest number of devices. Companies of all sizes and in all sectors are forced to pay a ransom to decrypt their data or to replace their infected devices.

(more available)
Added: February 13, 2019
  • ««
  • «
  • 30
  • 31
  • 32
  • 33
  • 34
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 16, 2025 20:08 UTC (build b1d7be4)