Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Global Insights: Supply Chain Cyber Risk

Global Insights: Supply Chain Cyber Risk

A survey of over 1,500 CIOs, CISO, and Chief Procurement Officers on their concerns and actions for supply chain management.

(more available)
Added: September 28, 2020
image from McAfee Labs COVID-19 Threats Report July 2020

McAfee Labs COVID-19 Threats Report July 2020

A deep dive threat report into COVID-19 related attacks.

Added: September 27, 2020
image from Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

Cybersecurity Skills Gap Threatens Job Effectiveness Amidst Global Talent Shortage

A June 2020 survey to assess the current challenges and perceptions of the oft-mentioned cybersecurity skills gap problem faced by IT and security teams worldwide. More than 800 individuals of varying experience, ranging from system admins to CISOs, responded. Key takeaways from the survey are reported here.

(more available)
Added: September 27, 2020
image from The 2020 (ISC)2  Cybersecurity Perception Study

The 2020 (ISC)2 Cybersecurity Perception Study

This report discusses the perceptions uncovered by the study and provides conclusions that hiring organizations should consider as they work to locate and recruit additional staff to their cybersecurity teams.

(more available)
Added: September 27, 2020
image from What Decision Makers Can Do About Data Protection

What Decision Makers Can Do About Data Protection

Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision makers with responsibility for protecting the integrity of corporate data assets. This report tries to show decision makers how to go about this.

(more available)
Added: September 25, 2020
image from State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

State of the Internet: Security Report: Volume 6, Issue 2 - Gaming

Using Akamai’s global visibility and content delivery networks, this report covers the security threats present in the gaming industry. An exploration of how gamers are a growing lucrative target for criminals, including methods, geography, and recommendations.

(more available)
Added: September 23, 2020
image from 2020 Application Security Observability Report

2020 Application Security Observability Report

A report from aggregate telemetry on Contrast Security customers’ applications between June 2019 and May 2020. Covers application vulnerability prevalence, time to remediation, attacks, and composition, among other themes.

(more available)
Added: September 16, 2020
image from Understand the Mistakes that Compromise your Company's Cybersecurity

Understand the Mistakes that Compromise your Company's Cybersecurity

Tessian’s research reveals how distraction, stress and fatigue influence people’s ability to consistently make good cybersecurity decisions, and how the events of 2020 have highlighted why now - more than ever - businesses need to protect their employees.

(more available)
Added: September 8, 2020
image from State of Cybersecurity Industry Exposure at Dark Web

State of Cybersecurity Industry Exposure at Dark Web

This research purports to help better understand the emerging risks and modern threat landscape both in qualitative and quantitative aspects, and to help cybersecurity companies better prioritize and address emerging cyber risks.

(more available)
Added: September 8, 2020
image from The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture.

(more available)
Added: September 3, 2020
image from H2 2020 Email Fraud & Identity Deception Trends

H2 2020 Email Fraud & Identity Deception Trends

This biannual report from Agari goes in-depth on changes and trends in email and identity fraud for the second half of 2020.

(more available)
Added: September 2, 2020
image from Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

Claroty Biannual ICS Risk & Vulnerability Report: 1H 2020

The objective of this report is to provide nuanced insight into the ICS risk and vulnerability landscape, the challenges it poses to operational technology (OT) security practitioners, and what conclusions can be drawn from publicly available data.

(more available)
Added: September 2, 2020
image from Cybersecurity: Building Business Resilience

Cybersecurity: Building Business Resilience

Robert Walters and VacancySoft have partnered together to analyse the UK cybersecurity hiring market, exploring the key trends that havemaintained job growth throughout 2020, and the key skills areas where we’ll see demand thrive as the decade progresses.

(more available)
Added: September 2, 2020
image from Redesigning Tech Conferences With Women in Mind

Redesigning Tech Conferences With Women in Mind

This report is based of a survey done in December 2019. It discusses changes they hope to make in tech conferences.

(more available)
Added: September 1, 2020
image from State of Cloud Security In 2020: DDoS and WAF

State of Cloud Security In 2020: DDoS and WAF

The 2020 Intricately Cloud Security Market Report unpacks global cloud security trends surrounding the growth of application security.

Added: September 1, 2020
image from 2020 State of the Software Supply Chain

2020 State of the Software Supply Chain

Now in its sixth year, Sonatype’s State of the Software Supply Chain Report continues to examine measurable practices of secure open source software development and delivery.

(more available)
Added: September 1, 2020
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies.

(more available)
Added: August 21, 2020
image from Enduring from home

Enduring from home

A survey of 200 IT professionals on the readiness and impact of COVID-19 upon cyber security.

Added: August 20, 2020
image from The state of vulnerability management in the cloud and on-premises

The state of vulnerability management in the cloud and on-premises

A survey-baed report of 1,848 IT and IT Security professionals on the challenges with vulnerability prioritization and the importance of patch management for the prevention of breaches. Touches on the challenges of CMDBs and container security.

(more available)
Added: August 18, 2020
image from The CISO Current Report, Q2 2020

The CISO Current Report, Q2 2020

This paper compiles observations as well as predictions on the state of cybersecurity in 2020.

Added: August 17, 2020
image from 2020 Mid Year Report

2020 Mid Year Report

This mid year report covers publicly disclosed data breaches first reported between January 1, 2020 and June 30, 2020 and compares current observations to the same time period for prior years.

(more available)
Added: August 17, 2020
  • ««
  • «
  • 28
  • 29
  • 30
  • 31
  • 32
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 6, 2025 08:08 UTC (build b1d7be4)