Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Privilege abuse

Below you will find reports with the tag of “Privilege abuse”

image from 2023 Insider Threat Report

2023 Insider Threat Report

The 2023 Insider Threat Report surveyed over 326 cybersecurity professionals to reveal the latest trends and challenges facing organizations in this changing environment. (more available)
Added: January 27, 2023
image from 2021 Trends In Identity

2021 Trends In Identity

The Trends in Identity Report that looks at the wide range of identity crimes committed against individuals as reported by the victims of those crimes. (more available)
Added: January 4, 2023
image from 2022 Consumer Impact Report

2022 Consumer Impact Report

The 2022 Consumer Impact Report goes beyond the known financial implications of identity crimes and explores the lost opportunities, as well as the emotional, physical and psychological impacts experienced by victims resulting from the crimes. (more available)
Added: January 4, 2023
image from 2021 Insider Threat Report

2021 Insider Threat Report

The 2021 Insider Threat Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to protect their critical data and IT infrastructure better. (more available)
Added: October 24, 2022
image from 2021 Insider Landscape Report

2021 Insider Landscape Report

The 2021 Insider Landscape Report reveals the latest trends and challenges facing organizations in this new environment. The report explores how IT and cybersecurity professionals deal with risky insiders and how organizations are preparing to better protect their critical data and IT infrastructure. (more available)
Added: October 18, 2022
image from Managed Security Report 2022

Managed Security Report 2022

The 2022 Managed Security Report reveals the latest trends and attitudes toward managed security, answering why organizations invest in security outsourcing, what challenges they are facing, and what requirements companies are prioritizing. (more available)
Added: October 18, 2022
image from PwC's Global Economic Crime and Fraud Survey 2022

PwC's Global Economic Crime and Fraud Survey 2022

The year’s Global Economic Crime and Fraud Survey enquired about organizations' attitudes towards fraud and financial and economic crime in the current environment and drew responses from 1,296 respondents in 53 countries and regions. (more available)
Added: September 6, 2022
image from 2020 Securonix Insider Threat Report

2020 Securonix Insider Threat Report

Insider threat continues to be a problem for organizations, regardless of size or industry. Companies are trying to mitigate this risk by continuously investing in tools, people, and processes. (more available)
Added: May 21, 2020
image from 2020 Cost of Insider Threats: Global Report

2020 Cost of Insider Threats: Global Report

Ponemon Institute is pleased to present the findings of the 2020 Cost of Insider Threats: Global study. Sponsored by ObserveIT and IBM, this is the third benchmark study conducted to understand the direct and indirect costs that result from insider threats. (more available)
Added: March 29, 2020
image from Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

This report from Pew Research Center goes over how and where the average person’s personal information is used online. It goes over the lack of control most people feel, who collects your data, the lack of understanding people have over who uses their data, and how people think about the privacy and vulnerability of their personal data. (more available)
Added: February 12, 2020
image from 2020 Insider Threat Report

2020 Insider Threat Report

The 2020 Insider Threat Report reveals the latest trends and challenges facing organizations, how IT and security professionals are dealing with risky insiders, and how organizations are preparing to better protect their critical data and IT infrastructure. (more available)
Added: February 9, 2020
image from Privileged Access Threat Report 2019

Privileged Access Threat Report 2019

In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks. (more available)
Added: February 6, 2020
image from Consumer Loss Barometer - The Economics of Trust

Consumer Loss Barometer - The Economics of Trust

Understanding the gap in perceptions of cybersecurity between consumers and the organizations that serve them is a key theme of this report. (more available)
Added: May 18, 2019
image from Threatbusters: BitGlass' 2019 Insider Threat Report

Threatbusters: BitGlass' 2019 Insider Threat Report

Insider threats constitute a legitimate danger to enterprise security. While protecting data from malicious external actors is typically top of mind for most organizations, the fact remains that they must also defend against negligent and disgruntled insiders. (more available)
Added: April 19, 2019
image from 2019 SIEM Survey Report

2019 SIEM Survey Report

The 2019 SIEM Survey Report represents one of the most comprehensive surveys on SIEM to date, designed to explore the latest trends, key challenges, and solution preferences for SIEM. (more available)
Added: February 6, 2019
image from Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

Detecting and Stopping Famous Insider Attacks through Behavioral Analytics

This paper is a theoretical study looking at three famous cases of insider attacks that occurred over the past six years. (more available)
Added: February 5, 2019
image from Advanced Endpoint Protection

Advanced Endpoint Protection

This report offers insight into the Cylance methodology of endpoint protection.
Added: December 29, 2018
image from A Hidden Economy: Retail Fraud In The Digital Age

A Hidden Economy: Retail Fraud In The Digital Age

Working with some of the world’s leading online brands, CyberInt takes a look at the fraud threats that retailers receive in the cyber world. (more available)
Added: December 5, 2018
image from Consumer Attitudes Toward Data Privacy Survey

Consumer Attitudes Toward Data Privacy Survey

This survey shows many American consumers are in favor of regulations designed to give them greater control over how businesses use their personal data. (more available)
Added: November 24, 2018
image from PLATINUM continues to evolve, find ways to maintain invisibility

PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft has come across an evolution of PLATINUM’s file-transfer tool, one that uses the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. (more available)
Added: November 15, 2018
image from Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Given that the most important information resides in databases, organizations are increasingly turning their focus toward databases security technologies. To defend databases from attackers using stolen credentials, the industry is beginning to adopt a new security paradigm based on machine learning and behavior analysis. (more available)
Added: October 26, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 8, 2023 20:08 UTC (build 051771c)