Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Privileged Access Threat Report 2019

Privileged Access Threat Report 2019

In this fourth edition of BeyondTrust’s annual Privileged Access Threat Report, we’ll be exploring the 2019 threat landscape in detail, with a focus on how security decision makers are utilizing Privileged Access Management (PAM) solutions to mitigate these risks.

(more available)
Added: February 6, 2020
image from The Secure Access Threat Report 2017

The Secure Access Threat Report 2017

Bomgar outlines how to defend against security threats, showing two distinct groups of threats, prevention techniques, etc.

Added: February 6, 2020
image from Information Security and Cyber Risk Management Report 2019

Information Security and Cyber Risk Management Report 2019

A survey conducted by Advisen covering changes since last years survey, including a more than 70 percent satisfactionrate reported by respondents who havehad a cyber claim which either resulted ineconomic damage or business interruption.

(more available)
Added: December 4, 2019
image from State of DevOps 2019

State of DevOps 2019

This report investigates the ways in which organizations can support engineering productivity through initiatives such as supporting information search, more usable deployment toolchains, and reducing technical debt through flexible architecture, code maintainability, and viewable systems.

(more available)
Added: November 27, 2019
image from How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain

this report t explores the vulnerability-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers.

(more available)
Added: November 26, 2019
image from Vulnerability QuickView Report Q3 2019

Vulnerability QuickView Report Q3 2019

Risk Based Security has been sharing our Vulnerability QuickView reports with the world, providing detailed analysis on the vulnerability landscape based on data from our vulnerability intelligence product, VulnDB . Continuing from our previous 2019 Mid-Year report, this edition of the QuickView delves into the months of August through October. The information collected is displayed in a series of charts depicting various groupings, classifications, insights, and comparisons of the data

(more available)
Added: November 25, 2019
image from State of Software Security Volume 10

State of Software Security Volume 10

This report goes in depth on the state of software security, going into overall security, application security testing, how flaws are and are not equal, and security debt.

(more available)
Added: November 25, 2019
image from Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 Survey

A survey of over 300 security professionals on security operations center (SOC) practices and how those practices relate to outcomes.

(more available)
Added: November 25, 2019
image from 2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

2018 State of Security Operations: Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide

A review of current maturity levels and practices as seen from Micro Focus’s five year history of reviewing security programs.

(more available)
Added: November 25, 2019
image from Road to Security Operations Maturity

Road to Security Operations Maturity

A survey of over 250 security professionals on security operations center (SOC) practices and how those practices relate to outcomes.

(more available)
Added: November 25, 2019
image from 2020 Cyber Trendscape report

2020 Cyber Trendscape report

The goal of this initiative was to identify trends impacting cyber security decisions, the top cyber security priorities for 2020 and beyond, the focus of risk mitigation strategies, and to highlight the overall beliefs and perceptions held by senior executives regarding the state of the cyber threat landscape and how the cyber security industry, governments and regulatory agencies are responding to their needs.

(more available)
Added: November 25, 2019
image from IT security economics in 2019

IT security economics in 2019

The Kaspersky Global Corporate IT Security Risks Survey (ITSRS) is a global survey of IT business decision makers, which is now in its ninth year. A total of 4,958 interviews were conducted across 23 countries. Respondents were asked about the state of IT security within their organizations, the types of threats they face and the costs they have to deal with when recovering from attacks. The regions covered consist of LATAM (Latin America), Europe, North America, APAC (Asia-Pacific with China), Japan, Russia and META (Middle East, Turkey and Africa).

(more available)
Added: November 25, 2019
image from Economic Value of DNS Security

Economic Value of DNS Security

Using data from the Verizon DBIR and other sources, this report reviews the value of DNS in overall organizational security.

(more available)
Added: November 25, 2019
image from Overwatch 2019 mid-year report

Overwatch 2019 mid-year report

An analysis of threat actors and key action patterns based upon CrowdStrike’s threat hunting human analyst team over the first half of 2019.

(more available)
Added: November 25, 2019
image from Cloud Down Impact on the US Economy

Cloud Down Impact on the US Economy

The insurance industry has been asked by Lloyd’s, regulators, and its own senior management to understand its exposure to this type of cyber risk. To address this, AIR has developed a comprehensive database of industry exposures that provides the information insurers need for accurate modelling and has used it to form the basis of the alternative modelling approach described in this report. The results of this cloud downtime scenarios analysis could help insurance managers gain insights into how to grow their cyber business in a controlled and prudent manner.

(more available)
Added: November 25, 2019
image from 2019 Payment Security Report

2019 Payment Security Report

The PSR has the unique role of measuring the strengths and weaknesses of the PCI DSS and tracking the sustainability of compliance. It also measures and tracks challenges associated with implementing and maintaining security controls required for PCI DSS compliance.

(more available)
Added: November 25, 2019
image from Quarterly Threat Landscape Report Q3 2018

Quarterly Threat Landscape Report Q3 2018

This publication from Fortinet looks at how the threat landscape has changed in the third quarter of 2018 by doing data-driven analysis with some noteworthy events pulled from Q3 2018 headlines.

(more available)
Added: October 1, 2019
image from Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey

This 2019 edition of the SANS Security Operations Center (SOC) Survey was designed to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The goal is to capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and to highlight key areas on which SOC managers can focus to increase the effectiveness and efficiency of security operations.

(more available)
Added: October 1, 2019
image from Internet Risk Surface Report

Internet Risk Surface Report

This report goes in depth into the state of Internet security, including how companies are storing data, orgation’s internet surface areas, and where exposures exist the most.

(more available)
Added: October 1, 2019
image from Fortinet Quarterly Threat Landscape Report Q2 2019

Fortinet Quarterly Threat Landscape Report Q2 2019

This is quarterly publication from Fortinet that looks in the current cyber security threats from April 1 to July 1.

(more available)
Added: October 1, 2019
image from Incident Preparedness and Response Report

Incident Preparedness and Response Report

The VIPR report (Verizon Incident Preparedness and Response Report) outlines preparations and responses to data breaches. This includes 6 phases, planning and preparation, detection and validation, containment and eradication, collection and analysis, remediation and recovery, and assessment and adjustment.

(more available)
Added: October 1, 2019
  • ««
  • «
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 7, 2025 20:09 UTC (build b1d7be4)