Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from 2023 Insider Threat Report

2023 Insider Threat Report

The 2023 Insider Threat Report surveyed over 326 cybersecurity professionals to reveal the latest trends and challenges facing organizations in this changing environment. The report explores their critical data and IT infrastructure. New report from Cybersecurity Insiders and Gurucul shows growing risk from insider from insider attacks as they become more frequent and more difficult to detect, raising concern by security pros.

(more available)
Added: January 27, 2023
image from Global Cybersecurity Outlook 2022

Global Cybersecurity Outlook 2022

The Global Cybersecurity Outlook flagship report identifies the trends and analyzes the near-term future cybersecurity challenges. The accelerated shift to remote working during the COVID-19 pandemic coupled the recent high-profile cyberattacks have resulted in bringing cybersecurity top of mind among key decision-makers in organizations and nations.

(more available)
Added: January 19, 2023
image from Energy Sector Threat Trends Report 2022

Energy Sector Threat Trends Report 2022

The global energy sector is facing a time of uncertainly due to a confluence of geopolitical, economic, and environmental factors. In tandem, the cyber threat landscape is growing increasingly complex, further complicating the picture for global energy suppliers. While governments and regulatory bodies urge the critical infrastructure sector to double down on cyber defense.

(more available)
Added: January 18, 2023
image from The State of Vulnerability Management 2022

The State of Vulnerability Management 2022

For this survey, we surveyed 426 security professionals directly responsible for managing cyber vulnerabilities in their day-to-day work. The survey was conducted online via Pollfish using organic sampling. What we found is that some organizations have effective ways to detect, respond to, and remediate their vulnerabilities, while other organizations have more blind spots than they think.

(more available)
Added: January 17, 2023
image from 2023 Cybersecurity Status Report

2023 Cybersecurity Status Report

Ivanti surveyed over 6,500 executives leaders, cybersecurity professionals and office workers in October 2022. Our goal: to understand today’s threats - from the perspective of security professionals, as well as executive leaders and all other office workers - plus find out how companies are preparing for yet - unknown future threats.

(more available)
Added: January 11, 2023
image from January 2023 Threat Horizon Report

January 2023 Threat Horizon Report

The Google Cloud Threat Horizons Report brings decision-makers strategic intelligence on threats to cloud enterprise users and the best original cloud-relevant research and security recommendations from throughout Google’s intelligence and security teams.

(more available)
Added: January 11, 2023
image from 2021 Global Automotive Cybersecurity Report

2021 Global Automotive Cybersecurity Report

As a leader in automotive cybersecurity and automotive cyber threat intelligence, Upstream Security continually monitors and analyzes worldwide cyber incidents to protect the automotive ecosystem from cyber threats and misuse. This report was created by analyzing 633 publicly reported incidents since 2010, 207 of them in 2020 as of November 25, 2020.

(more available)
Added: January 11, 2023
image from 2022 Global Automotive Cybersecurity Report

2022 Global Automotive Cybersecurity Report

This report was created by analyzing 900+ publicly reported incidents that occurred since 2010, with an increase of more than 225% in the number of incidents taking place in 2021 alone, when compared to 2018. Our researchers have carefully categorized the data we have collected, analyzing each incident’s attack methods, attack vectors, impact, target industries, and many other aspects.

(more available)
Added: January 11, 2023
image from 2023 Global Automotive Cybersecurity Report

2023 Global Automotive Cybersecurity Report

This report marks Upstream’s fifth annual report, uncovering the expanding and emerging automotive cybersecurity risks, and how they impact the entire smart mobility ecosystem.

(more available)
Added: January 11, 2023
image from IRIS Tsunami

IRIS Tsunami

We identified 50 of the largest multi-party cyber incidents over the past several years in an effort to understand their causes and consequences from beginning to end. Tsunami draws from the same rigorous methodology in the rest of the IRIS series. We started with a huge dataset of cyber loss events, identified those that involved multiple organizations, and then researched each event to understand who was behind it, what happened, how the after effects propagated through the supply chain, and the financial losses for all parties involved.

(more available)
Added: January 9, 2023
image from 2021 Trends In Identity

2021 Trends In Identity

The Trends in Identity Report that looks at the wide range of identity crimes committed against individuals as reported by the victims of those crimes. You’ll learn first-hand of the identity scams we see and how criminals convince people to willingly share information they know should be protected.

(more available)
Added: January 4, 2023
image from 2022 Consumer Impact Report

2022 Consumer Impact Report

The 2022 Consumer Impact Report goes beyond the known financial implications of identity crimes and explores the lost opportunities, as well as the emotional, physical and psychological impacts experienced by victims resulting from the crimes.

(more available)
Added: January 4, 2023
image from 2022 Business Impact Report

2022 Business Impact Report

Our 2022 Business Impact Report looks into what happens specifically to small businesses and solopreneurs following a data or security breach. For the report, the ITRC surveyed 447 small business owners, leaders, and employees to paint a picture of small organizations and individuals that are significantly impacted by cybercrimes, often multiple times in a short period of time.

(more available)
Added: January 4, 2023
image from The State of Supply Chain Defense

The State of Supply Chain Defense

In this years report, we’ll focus attention on how organizations are moving past problem identification and mitigating cyber risk challenges within supply chain vendors. We’ll also explore the challenges identified by this year’s respondents in establishing internal and third-party sourced functions and technologies for supply chain risk mitigation.

(more available)
Added: December 27, 2022
image from Intelligence-Powered Security Operations

Intelligence-Powered Security Operations

In Intelligence-Powered Security Operations, risk and threat intelligence is combined with human expertise and machine power to deliver better outcomes to the business as a while. Ultimately, intelligence-powered security operations programs will deliver smarter security and better results.

(more available)
Added: December 22, 2022
image from Deepwatch SecOps Pulse Survey Q4 2022

Deepwatch SecOps Pulse Survey Q4 2022

The Deepwatch SecOps Pulse Survey research shows that security teams are more focused on improving response capabilities over detection improvements. This speaks to rising threats and an expanding attack surface that makes attacks nearly inevitable, forcing teams to prioritize limited resources.

(more available)
Added: December 22, 2022
image from Threat Intelligence Report -Q2 2022

Threat Intelligence Report -Q2 2022

This report leveraged the Fortinet service to provide a deep dive into what adversaries are seeing, doing, and planning, enabling organizations to better understand the threats posed by the growth of criminal forums and markets operating on the darknet. The report covers global, regional, and industry/sector threat landscape perspective as well as protection recommendations for IT and OT organizations for darknet activity observed during Q2 2022.

(more available)
Added: December 22, 2022
image from 2022 Year In Review

2022 Year In Review

In a year of new and evolving cyber risks, our community banded together to protect the global financial system and the people it serves. From the latest in phishing lures to nation-state threats, from new ransomware tactics to managing supply chain risk. we focused on arming our members with the intelligence and knowledge they need to keep our sector secure and resilient.

(more available)
Added: December 21, 2022
image from The 2022 VOID Report

The 2022 VOID Report

The past year, the VOID grew from 2,000 to nearly 10,000 incident reports from close to 600 organizations. We rigorously collect the same metadata, along with a new value: severity. This enabled us to investigate whether there is a relationship between the reported length of the incident and the impact (or severity) of the incident.

(more available)
Added: December 21, 2022
image from The State of Dependency Management

The State of Dependency Management

In their inaugural report, the Station 9 research team explores the complexities of open source dependencies and the top security considerations for open source adoption at the enterprise.

(more available)
Added: December 20, 2022
image from 2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

This year’s report starts with a close look at OverWatch’s extensive dataset covering observed interactive threat actor behaviors, which we will refer to in this report as “intrusion activity.” It uses this data to examine how and where adversaries are operating to provide a comprehensive overview of the threat landscape.

(more available)
Added: December 20, 2022
  • ««
  • «
  • 16
  • 17
  • 18
  • 19
  • 20
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)