Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Threat Intelligence Executive Report 2020 Vol. 3

Threat Intelligence Executive Report 2020 Vol. 3

The Threat Intelligence Executive Report by Secureworks analyzes security threats and helps organizations protect their systems. During March and April of 2020, Secureworks noticed 3 developments in threat intelligence: Multiple threat actors leverage COVID-19, Remote access security is essential in the current working environment, and big breaches begin with small intrusions.

(more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 2

Threat Intelligence Executive Report 2020 Vol. 2

The Threat Intelligence Executive Report by Secureworks analyzes security threats and aims to help organizations protect their systems. In the first two months of 2020, they identified 3 main trends: Lesser-known government-sponsored threat groups putting data at risk, Citrix vulnerability disclosure causing spikes in incidents, and ransomware operators leveraging risk of GDPR fines as a threat.

(more available)
Added: July 8, 2020
image from Threat Intelligence Executive Report 2020 Vol. 1

Threat Intelligence Executive Report 2020 Vol. 1

The Threat Intelligence Executive Report by Secureworks is a report designed to analyze security threats and help organizations protect their systems. In this report, they look into Iranian espionage operations in 2020, Customized Magecart attacks, and China based threat groups targeting NGOs and Asian government networks.

(more available)
Added: July 8, 2020
image from 2020 State of Operational Technology and Cybersecurity Report

2020 State of Operational Technology and Cybersecurity Report

A survey of stakeholders in operational technology (OT) environments across four industries: manufacturing, energy and utilities, healthcare, and transportation.

Added: July 7, 2020
image from 2020 Cloud Misconfigurations Report

2020 Cloud Misconfigurations Report

DivvyCloud researchers compiled this report to substantiate the growing trend of breaches caused by cloud misconfigurations, quantify their impact to companies and consumers around the world, and identify factors that may increase the likelihood a company will suffer such a breach.

(more available)
Added: July 6, 2020
image from 2020 Incident Response and Data Breach Report

2020 Incident Response and Data Breach Report

Drawn on over 1,000 incidents that The Crypsis Group responded to in 2019, this report looks for trends in industry and attack patterns for the past year. Primary focus areas for the report are ransomware, business email compromise (BEC), and data breaches. Also includes suggestions on defensive measures where appropriate.

(more available)
Added: July 6, 2020
image from Cyber Resilient Organization Report 2020

Cyber Resilient Organization Report 2020

The fifth annual survey uses survey results from over 3,4000 It and security professionals on organization’s ability to detect, prevent, contain, and respond to cybersecurity incidents.

(more available)
Added: July 1, 2020
image from Cyber Pulse: The State of Cybersecurity in Healthcare- Part Two

Cyber Pulse: The State of Cybersecurity in Healthcare- Part Two

To have a better understanding of where the healthcare industry stands in their knowledge of cybersecurity, Kaspersky commissioned a survey to gauge the perceptions of healthcare employees in North America with regard to cybersecurity in the workplace. The survey offered several valuable insights, so many in fact that the findings were too vast to fit in one report. This is a follow up report to the first State of Cybersecurity in Healthcare report.

(more available)
Added: June 29, 2020
image from Consumer Attitudes Toward Data Privacy Survey, 2018

Consumer Attitudes Toward Data Privacy Survey, 2018

This report by Akamai, sought to find out how much consumers trust companies. The study found that American consumers are very forgiving with companies that have access to their personal information.

(more available)
Added: June 29, 2020
image from Vulnerabilities in the Core

Vulnerabilities in the Core

This report sought to understand the health and security of Free and Open Source Software (FOSS) as it is today. It identifies the most commonly used free and open source software components in production applications, and examines them for potential vulnerabilities.

(more available)
Added: June 29, 2020
image from 2020 Cloud Security Report

2020 Cloud Security Report

The Cloud Security Report is an annual paper published by ISC(2). It goes in depth on the changing cloud environment as companies continue to rapidly migrate workloads from data centers to the cloud.

(more available)
Added: June 25, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
image from Trends in Cybersecurity Breach Disclosures

Trends in Cybersecurity Breach Disclosures

A review of cybersecurity breach trends affecting public companies from 2011 through 2019. Use the breach database compiled and maintained by Audit Analytics.

(more available)
Added: June 24, 2020
image from BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

BlackHat USA Attendee Survey: Cyber Threats in Turbulent Times

A survey of 273 security professionals on the implications of the COVID-19 pandemic on security perceptions.

Added: June 24, 2020
image from The State of Application Security, 2020

The State of Application Security, 2020

This report from Forrester goes into the state of application security for 2020, detailing changes in the external attack methods, and changes companies should make to their application security efforts.

(more available)
Added: June 24, 2020
image from Inside the Mind of a Hacker 2020

Inside the Mind of a Hacker 2020

The annual report on the composition and findings of security testing as powered by BugCrowd’s bug bounty platform of nearly 3,500 security testers.

(more available)
Added: June 23, 2020
image from The 2020 Hacker Report

The 2020 Hacker Report

The fourth annual report from Hacker One on the state of the open security testing community, using data from Hacker One’s bug bounty program.

(more available)
Added: June 23, 2020
image from 2020 State of Application Services Report

2020 State of Application Services Report

For the sixth annual State of Application Services survey, F5 heard from nearly 2,600 respondents globally— across a range of industries, company sizes, and roles—about the challenges and opportunities presented by the ongoing process of digital transformation. Their responses provide a unique view of the trends shaping the application landscape and how organizations around the world are transforming to meet the ever-changing demands of the digital economy.

(more available)
Added: June 23, 2020
image from The Fraud Beat 2018

The Fraud Beat 2018

This report goes in-depth on the most popular fraud techniques and how to prevent fraud attacks on your business.

Added: June 23, 2020
image from The Path from Reactive to Proactive Third-Party Risk Management

The Path from Reactive to Proactive Third-Party Risk Management

Uses survey-based polling to identify common challenges organizations face in managing third part risk management (TPRM) programs. Also provides analysis on some possible ways of addressing these concerns.

(more available)
Added: June 22, 2020
image from Driving Cybersecurity Performance

Driving Cybersecurity Performance

A survey of over 1,000 firms into how cybersecurity leaders organize their programs, where they invest, and which technologies, processes, and analytical tools they use. A goal of focusing on guidng readers to optimize the use of cybersecurity resources.

(more available)
Added: June 22, 2020
  • ««
  • «
  • 30
  • 31
  • 32
  • 33
  • 34
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 08:08 UTC (build b1d7be4)