Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Global Security Insights Report 2021

Global Security Insights Report 2021

This research was conducted to understand the challenges and issues facing businesses worldwide when it comes to escalating cyberattacks. It identifies trends in hacking and malicious attacks, and the financial and repetitional impact breaches had in what has been an unprecedented year. It examines organizations’ plans for securing new technology, adopting a cloud-first security strategy, and dealing with the complexity of the current cybersecurity management environment.

(more available)
Added: May 4, 2023
image from Global Threat Report June 2020

Global Threat Report June 2020

The global cyber threat landscape has escalated. In this, our third Global Threat Report, we find that attack frequency has reached unprecedented levels; 90% of security professionals said the volume of attacks they faced has increased. Attackers are employing a more diverse range of tactics and techniques than ever before as they bid to extort, disrupt and infiltrate organizations.

(more available)
Added: May 3, 2023
image from Global Threat Landscape Report February 2023

Global Threat Landscape Report February 2023

FortiGuard Labs experts leverage Fortinet’s large global footprint to continually monitor the threat landscape and the major geopolitical events that influence it. This report presents findings and insights from six months of intense research, with recommendations for leaders and practitioners to better prepare and protect your organization.

(more available)
Added: May 3, 2023
image from Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

Threat Intelligence Spotlight: Protecting Your Law Firm's Data, Clients, and Reputation

In this threat intelligence spotlight report, eSentire’s Threat Response Unit (TRU) provides a threat analysis of the most common cyber threat detected across our global legal customer base.

(more available)
Added: May 3, 2023
image from The 2023 Global Ransomware Report

The 2023 Global Ransomware Report

In this year’s survey, more than 80% of respondents say they are “very” or “extremely” concerned about the threat of ransomware, yet a similar number (78%) of organizations surveyed also believe they are “very” or “extremely” prepared to thwart a breach. Despite those concerns and feelings of preparedness, half of the organizations surveyed still fell victim to ransomware last year.

(more available)
Added: May 3, 2023
image from 2022 Cloud Security Threats

2022 Cloud Security Threats

This report is based on our research and experience from the past year in securing enterprise cloud environments. We chose to focus on novel, notable, and high-impact risks that we believe you should be familiar with and include in your cloud security strategy for 2022.

(more available)
Added: May 3, 2023
image from 2020 Vulnerability Statistics Report

2020 Vulnerability Statistics Report

This report aims to demonstrate the state of full stack security based on thousands of full stack assessments globally, delivered by the Edgescan SaaS during 2019. This report is still a joy to do as it gives decent insight into what’s going on from a trends and statistics perspective and overall state of cyber security. This report provides a glimpse of a global snapshot across dozens of industry verticals how to prioritize on what is important, as not all vulnerabilities are equal.

(more available)
Added: April 26, 2023
image from 2022 Vulnerability Statistics Report

2022 Vulnerability Statistics Report

The Edgescan report has become a reliable source for truly representing the global state of cyber security vulnerability management. This is becoming more evident as our unique dataset is now also part of other annual security analysis reports, such as the Verizon DBIR (we are happy contributors for many years now). This year we examined vulnerability metrics from a known vulnerability (CVE), Malware, Ransomware and visibility standpoint (exposed services), coupling both internal and public Internet-facing systems. We also take a look at how quick we are fixing various vulnerabilities based on risk.

(more available)
Added: April 26, 2023
image from 2023 State of Identity Security

2023 State of Identity Security

The report outlines the most significant identity attacks of 2022, the weaknesses of MFA, and the IAM hygiene issues that are increasing identity attack surfaces. This report analyzed user data, login information, and information from identity providers including Okta, Azure Active Directory, Duo, and Auth0. In total, the analysis covers more than 500,000 identities from organizations with 1,000+ employees.

(more available)
Added: April 26, 2023
image from Automation antidotes for the top poisons in cybersecurity

Automation antidotes for the top poisons in cybersecurity

A recent ThoughtLab study revealed the top cybersecurity challenges that are top-of-mind for IT leaders. This ebook will discuss how those challenges can poison your ability to protect your business why automating security operations is the antidote, and why 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe.

(more available)
Added: April 25, 2023
image from 2023 Cybersecurity Skills Gap

2023 Cybersecurity Skills Gap

The findings in this 2023 cybersecurity skills gap report clearly show that organizations are fighting an uphill battle against cyberthreat— incurring more breaches, in need of skilled professionals, and continuing to struggle to fill key positions.

(more available)
Added: April 25, 2023
image from 2021 Identity Breach Report

2021 Identity Breach Report

In 2020, Constella Intelligence’s threat intelligence team detected over 8,500 breaches and leakages circulating in dark markets and underground forums, representing nearly 12 billion records. Constella analyzed a significant portion of the breaches and leakages detected in underground marketplaces in 2020, constituting a 32% increase in the total volume of breaches and leakages analyzed in 2019. Constella’s 2021 Breach Report offers insights into these cyber threats and the impact of malign activities fueled by breach data circulating on the deep and dark web.

(more available)
Added: April 25, 2023
image from Constella Intelligence 2023 Identity Breach Report

Constella Intelligence 2023 Identity Breach Report

Constella’s threat intelligence team continuously collects identity records from data breaches and leakages found in open sources, on the surface, social, deep, and dark web, to track data related company breaches and the specific personally identifiable information (PII) exposed that represents a risk to organizations and their employees and customers. In this report, we detail the implications of the proliferation of info stealers and botnet malware and what these threats mean for the security of consumers and companies.

(more available)
Added: April 25, 2023
image from The State of Security 2023

The State of Security 2023

Cyberattacks continue to grow in quantity and sophistication at the same time that organizations’ systems become increasingly complex. Security teams, as always, feel the stress. But a surprising outcome of our 2023 State of Security research is that the number of respondents who say they just can’t keep up has shrunk. Whether this data represents incremental improvement or a onetime windfall, organizations should press any advantage. Which won’t be easy: Most security teams tell us they’re too stuck in reactive mode to be effectively proactive.

(more available)
Added: April 25, 2023
image from 2023 Third Party Data Breach Report

2023 Third Party Data Breach Report

This report, the result of a collective effort of Black Kite Researchers, focuses on what has changed in 2022, for better or for worse, compared to 2021. It highlights some of the lessons of past years and those still being learned within the changing cyber landscape. For this study, Black Kite Research analyzed 63 individual third party incidents, which ultimately resulted in more than 298 publicly-disclosed headline breaches and data leaks during the past year. These events inevitably caused thousands of other ripple-effect breaches throughout 2022. The report finalizes the lessons learned and relevant recommendations for the future.

(more available)
Added: April 25, 2023
image from The Fast and the Frivolous

The Fast and the Frivolous

The Fast and the Frivolous uses a massive dataset from SecurityScorecard that spans 1.6 million organizations. We analyze billions of internet-exposed assets to measure the speed of vulnerability remediation over a three-year period. In this report, you’ll find some of the lessons we learned.

(more available)
Added: April 25, 2023
image from Cisco 2023 Data Privacy Benchmark Study

Cisco 2023 Data Privacy Benchmark Study

The data in this study is derived from the Cisco Security Outcomes survey in which respondents were anonymous to the researchers and not informed who was conducting the study. Using the same methodology as prior years, more than 4700 security professionals from 26 geographies completed the survey in Summer 2022. Survey respondents represent major industries and a mix of company sizes.

(more available)
Added: April 25, 2023
image from Security Outcomes Report, Volume 3

Security Outcomes Report, Volume 3

In this third volume of the Security Outcomes Report, we break security resilience down into digestible and actionable insights. (Because we’re sure you have enough on your plate without having to crack the code to resilience on your own.) No one report can cover all there is to know about such a colossal subject matter; but we’ve surfaced some highlights for you to consider when building and refining your cybersecurity strategy for the road ahead.

(more available)
Added: April 25, 2023
image from High Risk Users and Where to Find Them

High Risk Users and Where to Find Them

It’s a horror story that many organizations are familiar with - an employee clicks a link or visits a website, and chaos ensues. At best, it’s just a minor disruption. At worst, business continuity is broken, and an organization’s critical infrastructure is at risk. Regardless of the outcome, managing human risk is a major part of business today. In this report, we dive into what makes workers high risk, where those high risk users spend their time, what are their riskiest behaviors, and what that might mean for your organization’s security.

(more available)
Added: April 25, 2023
image from M-Trends Report 2023

M-Trends Report 2023

In releasing our annual M-Trends report, we aim to provide some of that same critical intelligence to the greater security community. M-Trends 2023 continues our tradition of offering details on the evolving cyber landscape, mitigation recommendations, and a wide variety of security incident-related metrics.

(more available)
Added: April 19, 2023
image from 2022 Cyber Claims Report

2022 Cyber Claims Report

The following report provides a detailed look into the incidents that led to claims from our policyholders over the second half of 2021. In addition to the data, we share a thoughtful analysis of the current trends and predictions for 2022.

(more available)
Added: April 19, 2023
  • ««
  • «
  • 12
  • 13
  • 14
  • 15
  • 16
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)