Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from The state of incident response 2021

The state of incident response 2021

A survey driven analysis of 500 security leaders from firms with 700 or more employees and revenues of $500 million or more.

(more available)
Added: June 18, 2021
image from Ransomware: The True Cost to Business

Ransomware: The True Cost to Business

A survey-driven report of 1,200 cybersecurity professionals from several countries. This survey focuses on the prevalence and impact of ransomware.

(more available)
Added: June 18, 2021
image from Security Outcomes Study: Endpoint Edition

Security Outcomes Study: Endpoint Edition

Endpoint security is the last line of defense. Now more than ever, effective endpoint protection is essential to the success of any cybersecurity program. The good news? A powerful endpoint security solution can help you avoid major incidents while setting you up for success across other business areas.

(more available)
Added: May 24, 2021
image from 2021 Voice of the CISO Report

2021 Voice of the CISO Report

A survey of CISOs across 1,400 organizations supplemented with interviews of 100 individuals.

Added: May 17, 2021
image from 2021 Data Breach Investigations Report

2021 Data Breach Investigations Report

The annual Data Breach Investigations Report (DBIR) is the annual marque analysis of breach and incident information over the previous year.

(more available)
Added: May 13, 2021
image from Elevating Human Attack Surface Management

Elevating Human Attack Surface Management

Every year, enterprises spend millions on security technology and training — only to be caught on the hamster wheel of responding to incidents caused by recurrent human errors. Incredibly, human error has played a role in 88% of the total losses from the largest cyber incidents of the last 5 years.

(more available)
Added: May 12, 2021
image from From Uncertainty to Understanding

From Uncertainty to Understanding

Using RiskRecon’s assessment information, explanatory models are built to demonstrate the value of technical information in predicting measures of risk at varying levels of greater technical insight.

(more available)
Added: May 11, 2021
image from State of Ransomware 2021

State of Ransomware 2021

An annual survey of 5,400 IT decision makers on the scope, nature, and ramifications of ransomware attacks.

Added: May 2, 2021
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

This annual cyber readiness report focusing on the threats and losses as reported via a survey of over 6,000 organizations.

(more available)
Added: April 22, 2021
image from The 2021 Security Outcomes Study – Small and Midsize Business Edition

The 2021 Security Outcomes Study – Small and Midsize Business Edition

What makes for successful cybersecurity? Is there evidence that security investments result in measurable outcomes? How do we know what actually works and what doesn’t? These are the types of burning questions guiding Cisco’s 2021 Security Outcomes Study, which pulls together the experiences of over 4,800 IT, security, and privacy professionals around the world. This document is an offshoot of the larger study that focuses on small and midsize businesses (SMBs). Discover how SMBs compare to larger enterprises when it comes to security, and what key factors contributed to successful security planning in companies like yours.

(more available)
Added: April 19, 2021
image from The Impact of the Solarwinds Breach on Cybersecurity

The Impact of the Solarwinds Breach on Cybersecurity

A survey of 200 global security professionals as to their opinions, responses, and outlook of the Solarwinds software chain compromise.

(more available)
Added: March 14, 2021
image from Aon's E&O | Cyber Insurance Snapshot

Aon's E&O | Cyber Insurance Snapshot

A review of current trends in the cyber insurance space, including key threat trends, claim frequency, severity, and pricing factors.

(more available)
Added: March 8, 2021
image from The State of Stalkerware in 2020

The State of Stalkerware in 2020

This report aims to examine the issue of stalkerware. They present data to understand the changes and scale of the problem in 2020.

(more available)
Added: February 28, 2021
image from The CISO's New Dawn

The CISO's New Dawn

This report looks at the roles and responsibility CISO’s have, highlighting changes over the past 12-18 months.

Added: February 24, 2021
image from Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

Securing a Shifting Landscape: Corporate perceptions of nation-state cyber-threats

This report assesses corporate perceptions of nation-state cyber-threats. It finds that companies have become more aware of the challenges posed by such threats and are concerned about them; however, their ability to respond to evolving risks may be lacking.

(more available)
Added: February 24, 2021
image from Cloud Impact Study Part 2: The Security and Compliance Barricade

Cloud Impact Study Part 2: The Security and Compliance Barricade

Part 2 of The Cloud Impact Study looks at the importance of security as a significant driver for cloud transformation, as well as how security and data protection concerns present a challenge that acts as the primary barrier to cloud transformation. This report explores how cloud computing can bolster the overall security of an organization, but as deployments become more complicated, so too does data governance and security.

(more available)
Added: February 22, 2021
image from Securing Your Apps in the Borderless Cloud

Securing Your Apps in the Borderless Cloud

This report takes a look at the public cloud, adoption trends, security concerns, app vulnerabilities, and a variety of related issues faced with rapid cloud adoption.

(more available)
Added: February 22, 2021
image from The State of Physical Security Entering 2021

The State of Physical Security Entering 2021

This report is based on a survey of business operations leaders to understand their changing perceptions and procedures with physical security as we enter 2021.

(more available)
Added: February 17, 2021
image from 2020 Year End Report: Data Breach QuickView

2020 Year End Report: Data Breach QuickView

This report looks at data breach events in 2020. It then compares key aspects and trends of these breaches to data breaches in previous years.

(more available)
Added: January 21, 2021
image from Sunburst Backdoor - Code Overlaps with Kazuar

Sunburst Backdoor - Code Overlaps with Kazuar

This report looks at the malware used by a group called Sunburst. It gives a detailed timeline of attacks, and the code used in them. It also compares the code to popular malware like Kazuar, suggesting it is being used by the same groups.

(more available)
Added: January 11, 2021
image from Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

Covid-19 Clicks: How Phishing Capitalized on a Global Crisis

This report is based off of a survey of 7,000 office workers around the world. It looks at worker’s understanding of phishing and email clicking habits. It also looks at changes in phishing since the COVID-19 pandemic. They reveal real-world concerns from workers around the globe and offer steps to help businesses and individuals resilient against phishing attacks.

(more available)
Added: December 18, 2020
  • ««
  • «
  • 25
  • 26
  • 27
  • 28
  • 29
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 08:08 UTC (build b1d7be4)