Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from 2020 Q3 Report: Data Breach QuickView

2020 Q3 Report: Data Breach QuickView

This report examines publicly disclosed data breach events, and describes trends and key changes for Q3 2020.

Added: October 29, 2020
image from The State of Industrial Cybersecurity in the Era of Digitalization

The State of Industrial Cybersecurity in the Era of Digitalization

An annual survey on the challenges and response to those challenges of cybersecurity in the Industrial Control Systems (ICS) space.

(more available)
Added: October 27, 2020
image from Protecting Data Privacy to Maintain Digital Trust

Protecting Data Privacy to Maintain Digital Trust

This study explores data privacy challenges for organizations that are trying to maintain digital trust with their customers, along with the evolving privacy landscape and its impact on consumers.

(more available)
Added: October 25, 2020
image from Information Security and Cyber Risk Management Report 2020

Information Security and Cyber Risk Management Report 2020

The tenth annual survey of risk managers, insurance buyers and other risk professionals. This covers the results of over 400 responses on attitudes and behaviors to cyber insurance and perceptions of risk.

(more available)
Added: October 22, 2020
image from 2020 SMB Cybersecurity Survey

2020 SMB Cybersecurity Survey

Presenting the results of a survey conducted on 2,055 small and medium-sized US businesses. Focuses on the chief cybersecurity concerns expressed by organizations, their planning pre- and post-COVID-19, approaches to remote work, and recovery planning. Cyber insurance attitudes are included.

(more available)
Added: October 21, 2020
image from SOTI/Security - Loyalty for Sale

SOTI/Security - Loyalty for Sale

This edition of the State of the Internet (SOTI)/Security report series focuses on the retail and hospitality sectors. An extensive review of how credential abuse attacks are carried out from both a methodology perspective and a volumetric angle is given.

(more available)
Added: October 21, 2020
image from Phishing Attack Landscape Report 2020

Phishing Attack Landscape Report 2020

This report shows the latest trends, challenges, and best practices for email security, designed to help organizations better protect against today’s threats.

(more available)
Added: October 20, 2020
image from Bulletproof Annual Cyber Security Industry Report 2020

Bulletproof Annual Cyber Security Industry Report 2020

Drawing from their managed SIEM, vulnerability scanning, and penetration testing practices, this report covers the key threat and compliance challenges over the 2019 calendar year.

(more available)
Added: October 19, 2020
image from Bulletproof Annual Cyber Security Report 2019

Bulletproof Annual Cyber Security Report 2019

Drawing from their managed SIEM, vulnerability scanning, and penetration testing services, this report reviews the key trends from the 2018 calendar year.

(more available)
Added: October 19, 2020
image from 2020 Deloitte-NASCIO Cybersecurity Study

2020 Deloitte-NASCIO Cybersecurity Study

This report reflects insights from 51 state and territory respondents on the CISO’s role, as well as budget, governance, reporting, workforce, and operations.

(more available)
Added: October 18, 2020
image from Moving Forward: Setting the Direction

Moving Forward: Setting the Direction

This report evaluates the state of security in healthcare in 2020, and compares it against 3-years’ worth of historical client data.

(more available)
Added: October 18, 2020
image from Internet Risk Surface in the Healthcare Sector

Internet Risk Surface in the Healthcare Sector

A deep dive into the nature of the healthcare sector’s public risk surface. Reviewing subsectors of the healthcare ecosystem, including supply chains.

(more available)
Added: October 15, 2020
image from New Vulnerability Found: Executive Overconfidence

New Vulnerability Found: Executive Overconfidence

This report attempts to understand the theory and practice of web application security in organizations worldwide.

Added: October 14, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more.

(more available)
Added: October 14, 2020
image from Cybersecurity: The Human Challenge

Cybersecurity: The Human Challenge

This study provides new insights into the state of cybersecurity skills and resources across the globe.

Added: October 14, 2020
image from 4th Annual Hacker Powered Security Report

4th Annual Hacker Powered Security Report

This report goes into the hacking industry in 2020. It talks about the impact of hackers on security, bug bounty trends, and more.

(more available)
Added: October 8, 2020
image from 2020 SMB IT Security Report

2020 SMB IT Security Report

This report focuses on cybersecurity for small and medium sized businesses for 2020. It goes over how cyber attacks have changed, how remote work has an effect, and more.

(more available)
Added: October 7, 2020
image from Cyber Insurance - The Market's View

Cyber Insurance - The Market's View

A survey of 260 cyber insurance brokers and 190 cyber insurers, on the challenges and opportunities in the cyber insurance space. Includes perspectives on aggregation risks, GDPR impact, and third part risk management.

(more available)
Added: October 6, 2020
image from ACSC Annual Cyber Threat Report: July 2019 to June 2020

ACSC Annual Cyber Threat Report: July 2019 to June 2020

This report outlines key cyber threats and statistics over the period 1 July 2019 to 30 June 2020. Over this period, the ACSC responded to 2,266 cyber security incidents and received 59,806 cybercrime reports at an average of 164 cybercrime reports per day, or one report every 10 minutes.

(more available)
Added: September 28, 2020
image from Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

Addressing Cyber Risk and Fraud in the Cloud: Oracle and KPMG Cloud Threat Report 2020 Series Vol. 3

This report explores how the broad adoption of cloud services has affected cyber risk and fraud.

Added: September 28, 2020
image from Global Insights: Supply Chain Cyber Risk - USA

Global Insights: Supply Chain Cyber Risk - USA

A survey of over 1,500 CIOs, CISO, and Chief Procurement Officers on their concerns and actions for supply chain management. This is a US specific version of the main report.

(more available)
Added: September 28, 2020
  • ««
  • «
  • 27
  • 28
  • 29
  • 30
  • 31
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 6, 2025 00:08 UTC (build b1d7be4)