Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Risk Analysis

Below you will find reports with the tag of “Risk Analysis”

image from Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Demystifying Third-Party Vendor Risk Management for Healthcare Organizations

Outsourcing is a fact of life for healthcare organizations, from routine functions such as food services and laundry to regulatory compliance and clinical activities. Large numbers of vendors must be properly managed in order to reduce clinical, financial and regulatory risk. This paper discusses how to reduce complexity in third-party vendor risk management, and how to turn uncertainty and confusion into efficiency and confidence.

(more available)
Added: March 7, 2019
image from CISO Guide: Measuring and Enhancing Enterprise Cyber-Resilience

CISO Guide: Measuring and Enhancing Enterprise Cyber-Resilience

How is cyber-resilience defined and measured? How are breach risk and cyber resilience related, and what is the best way to improve cyber-resilience for an enterprise? This paper will answer these questions and shed light on steps you can take to improve the cyber-resilience of your enterprise.

(more available)
Added: March 7, 2019
image from State of Internal Audit 2018 - Impact and Opportunities

State of Internal Audit 2018 - Impact and Opportunities

From the Report, “When you are faced with multiple risks and regulatory requirements, as well as constantly-changing industry trends, how do you connect the dots? How do you bring all this information together in a way that is meaningful to your organization? MetricStream Research offers you a range of cutting-edge GRC research reports, insights, and analyses that empower you to make informed and effective decisions on your GRC Journey®. Through primary and secondary research, we analyze the latest GRC trends and developments, and transform this data into the intelligence you need to drive exceptional performance.”

(more available)
Added: March 6, 2019
image from Building a Global Compliance Management Program For Large Banks

Building a Global Compliance Management Program For Large Banks

This report offers insight into issues that Global Banks have in maintaining Global Compliance.

Added: March 6, 2019
image from State of the Internet/Security Retail Attacks and API Traffic

State of the Internet/Security Retail Attacks and API Traffic

From the report, “All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked.”

(more available)
Added: March 1, 2019
image from Shifting Perspective: From Remediating To Avoiding Breaches

Shifting Perspective: From Remediating To Avoiding Breaches

In this paper, a depp look into existing cybersecurity practices, their shortcomings, and the urgent need to avoid breaches altogether and not just mitigate them after the fact.

(more available)
Added: February 27, 2019
image from Holiday Shopping Season Threat Activity: 2018 Snapshot

Holiday Shopping Season Threat Activity: 2018 Snapshot

This brief but important report offers information into the events and data from the holiday shopping season of 2018.

Added: February 27, 2019
image from Devopsifying Network Security

Devopsifying Network Security

From the report, “This technical whitepaper presents and discusses the concept of “Connectivity as Code”, a complementary concept to “Infrastructure as Code” (IaC), and we will explain how it can be incorporated into the DevOps lifecycle for a more agile application delivery. We will also describe how empowering the developer to define the application’s connectivity requirements will bridge the gap between developers and network security, and help to automate the application delivery process end-to-end. The solution presented in this whitepaper seamlessly weaves network connectivity into the DevOps methodology, while ensuring continuous compliance, so that automation does not compromise security.”

(more available)
Added: February 17, 2019
image from The State of Payment Processing & Fraud: 2018

The State of Payment Processing & Fraud: 2018

The State of Payment Processing & Fraud: 2018 Inaugural Survey & Report is a first-of-its kind study brought to you by Kount and The Fraud Practice. The inaugural survey reached hundreds of acquirers, processors, gateways, payment facilitators and issuers to get their take on the state of the industry and what is most critical for attracting and retaining clients and growing processing volumes.

(more available)
Added: February 16, 2019
image from 7 Secrets Of Online Fraud

7 Secrets Of Online Fraud

This is a handy guide that provides information useful for understanding online fraud.

Added: February 13, 2019
image from Cloud Security Trends: May 2018

Cloud Security Trends: May 2018

This report offers 14 tips to fortify your public cloud environment. From the report, “This edition of RedLock’s Cloud Security Trends marks the report’s one year anniversary, and it’s been a sobering year in terms of public cloud breaches, disclosures and attacks. This report highlights key learnings from these incidents along with research by the RedLock Cloud Security Intelligence (CSI) team to shed light on the trends that we can expect this year.”

(more available)
Added: February 12, 2019
image from 2019 AWS Cloud Security Report

2019 AWS Cloud Security Report

This report has been produced in partnership with the 400,000 member Cybersecurity Insiders community of IT security professionals to explore how AWS user organizations are responding to security threats in the cloud, and what tools and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

(more available)
Added: February 6, 2019
image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
image from The Q3 2018 Mobile Threat Landscape Report

The Q3 2018 Mobile Threat Landscape Report

RiskIQ uses its repository of scanned mobile application stores to perform analysis on threat trends in the mobile application space. Q3 showed a nearly 220 percent increase in blocklisted apps over Q2. Due to a surge in total apps observed, the percentage of blocklisted apps dropped from 4% in Q2 to 3% in Q3.

(more available)
Added: January 25, 2019
image from Eight Degrees Of Kevin Bacon: Threat Research Edition

Eight Degrees Of Kevin Bacon: Threat Research Edition

This report offers insight into how you can use the theory of 8 degrees of separation in threat research.

Added: January 25, 2019
image from Global DNS Defense Report Q1/2018

Global DNS Defense Report Q1/2018

In this new research, Farsight Security selected the primary domain for nearly 4000 organizations, including leading global corporations and higher education institutions. We then tested those domains using key DNS indicators to assess adoption of emerging technologies and risk exposure.

(more available)
Added: January 16, 2019
image from Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

A survey of financial services executives responsible for digital security measures at their firms (see Methodology) sheds light on the industry’s objectives for digital channels, perceptions about the scale of the threat posed by fraud and a range of vectors for attack, and confidence in existing defenses.

(more available)
Added: January 15, 2019
image from The Accountability Gap: Cybersecurity & Building A Culture Of Responsibility

The Accountability Gap: Cybersecurity & Building A Culture Of Responsibility

This study’s principal conclusion clearly mirrors today’s cybersecurity landscape: every organization is vulnerable to a cyber attack. This report uses measures of awareness and readiness to assess three degrees of vulnerability, each of which indicate differing needs to take action.

(more available)
Added: December 29, 2018
image from Taming Cybersecurity Regulation Mayhem

Taming Cybersecurity Regulation Mayhem

Cybersecurity incidents are increasing at astonishing rates with no end in sight. The impact of these incidents in business disruption, cost and invasion of individual privacy has provoked a groundswell of legislation and government regulation across the globe. With new regulations coming fast and furious, security professionals are often in uncharted territory, forced to juggle conflicting goals of security and privacy on one side and business growth and innovation on the other—and all under the umbrella of compliance and monitoring. Read on to learn more helpful information.

(more available)
Added: November 27, 2018
image from The CISO's Guide To Cybersecurity Risk Management and Measurement

The CISO's Guide To Cybersecurity Risk Management and Measurement

This report provides new mindsets and methods for measuring and minimizing business risk.

Added: November 27, 2018
image from Why Device Age Matters

Why Device Age Matters

Cybercriminals will use any and all devices available to them in order to lie, cheat and steal from you. Until they’re blocked. Then they switch to different devices, counting on your fraud prevention efforts to forget about their old devices. When that happens, they start using their old devices again. They would love for you to believe that device history isn’t important. That’s why your fraud prevention tools shouldn’t forget older devices either. It’s essential to know when a device, especially one that’s new to your business, has a history of fraud. Even if that fraud happened years ago.

(more available)
Added: November 24, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 12, 2025 00:08 UTC (build b1d7be4)