Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey

This year’s SANS survey saw an increase in usage and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.

(more available)
Added: May 18, 2019
image from The PSD2 Tracker: May 2019

The PSD2 Tracker: May 2019

This monthly report offers insights into the PDS2 regulations and news.

Added: May 18, 2019
image from The PSD2 Tracker: March 2019

The PSD2 Tracker: March 2019

This monthly report offers insight into PDS2 regulations and devleopments.

Added: May 18, 2019
image from The PSD2 Tracker: February 2019

The PSD2 Tracker: February 2019

This report offers monthly insights into the PSD2 regulations.

Added: May 18, 2019
image from Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

Leveraging Board Governance For Cybersecurity: The CISO/CIO Perspective

This report provides Advanced Cyber Security Center executives weighing in on the Board’s role as a strategic partner to management in balancing digital transformations and cybersecurity risks.

(more available)
Added: May 18, 2019
image from The Life and Times of Cybersecurity Professionals - 2018

The Life and Times of Cybersecurity Professionals - 2018

“In late 2018 and early 2019, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) conducted its third annual research product focused on the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 267 cybersecurity professionals and ISSA members. Ninety percent of survey respondents resided in North America, 5% came from Europe, 3% from Central/South America, 2% from Asia, and 1% from Africa (note: Total exceeds 100% due to rounding).”

(more available)
Added: May 18, 2019
image from Early Findings: Review of State and Local Government Ransomware Attacks

Early Findings: Review of State and Local Government Ransomware Attacks

This report is a discussion of the findings and trends of 169 ransomware incidents affecting state and local governments since 2013.

(more available)
Added: May 18, 2019
image from Consumer Loss Barometer - The Economics of Trust

Consumer Loss Barometer - The Economics of Trust

Understanding the gap in perceptions of cybersecurity between consumers and the organizations that serve them is a key theme of this report.

(more available)
Added: May 18, 2019
image from Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

Board Oversight and Cybersecurity: Leveraging Corporate Governance to Manage Cyber Threats

This report offers insight for lawyer’s and details how boards should proactively strive to create companywide cybersecurity protocols to avoid potential litigation.

(more available)
Added: May 18, 2019
image from Security Magatrends - January 2019

Security Magatrends - January 2019

This report identifies challenges and perceptions that enterprises, midmarket companies, and SMBs face across seven industry verticals including manufacturing, financial, and healthcare. The goal is to help readers to understand the common issues and where they are doing a better or worse job than others. Ultimately, the report will help readers understand how to handle threats better, no matter where they stand now.

(more available)
Added: May 18, 2019
image from Global Risk Management Survey - 2019

Global Risk Management Survey - 2019

Every organization, industry and economy around the world is confronting more risks than ever before. Considering this backdrop, it’s troubling that many organizations report that they may be less prepared than they have ever been. A key insight from Aon’s 2019 Global Risk Management Survey is that organizations need to be more prepared for the broad range of risks that threaten their ability to continue growing, protecting their brand and serving clients and stakeholders.

(more available)
Added: May 18, 2019
image from Hiscox Cyber Readiness Report 2019

Hiscox Cyber Readiness Report 2019

This third Hiscox Cyber Readiness Report provides you with an up-to-the-minute picture of the cyber readiness of organisations, as well as a blueprint for best practice in the fight to counter the ever-evolving cyber threat.

(more available)
Added: May 3, 2019
image from Hiscox Cyber Readiness Report 2018

Hiscox Cyber Readiness Report 2018

The Hiscox Cyber Readiness Report is compiled from a survey of more than 4,100 executives, departmental heads, IT managers and other key professionals in the UK, US, Germany, Spain and The Netherlands. Drawn from a representative sample of organisations by size and sector, these are the people on the front line of the business battle against cyber crime. While all are involved to a greater or lesser extent in their organisation’s cyber security effort, 45% make the final decision on how their business should respond. The report not only provides an up-to-the-minute picture of the cyber readiness of organisations large and small, it also offers a blueprint for best practice in the fight to counter an ever-evolving threat.

(more available)
Added: May 3, 2019
image from Cyber-Stress, Refreshed

Cyber-Stress, Refreshed

A study on the causes and evolution of Americans’ and Canadians’ stressors relating to cybersecurity and personal data protection

Added: May 3, 2019
image from 2019 Vulnerability Statistics Report

2019 Vulnerability Statistics Report

From the report, “For our 4th Year running, welcome to the edgescan Vulnerability Stats Report. This report aims to demonstrate the state of full stack security based on edgescan data for 2018. The edgescan report has become a reliable source for truly representing the global state of cyber security. This year we took a deeper look at vulnerability metrics from a known vulnerability (CVE) and visibility standpoint. We still see high rates of known/patchable vulnerabilities which have working exploits in the wild, which possibly demonstrates it is hard to patch production systems effectively on a consistent basis.”

(more available)
Added: May 3, 2019
image from Defending Against Today's Critical Threats: A 2019 Threat Report

Defending Against Today's Critical Threats: A 2019 Threat Report

As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future.

(more available)
Added: May 3, 2019
image from The Threat Intelligence Handbook

The Threat Intelligence Handbook

This e-book provides a practical guide for security teams to “unlock” the power of intelligence.

Added: April 23, 2019
image from Security Leadership Study - Trends in Application Security

Security Leadership Study - Trends in Application Security

The evolving threat landscape and perennial cybersecurity challenges are giving rise to community-based programs such as crowdsourced cybersecurity, an important evolution that’s fast becoming a foundational element of any organization’s cybersecurity program. Crowdsourced cybersecurity includes services such as bug bounty programs, vulnerability disclosure, and next-generation penetration testing (NGPT). This report explores several key findings based on research conducted by ESG.

(more available)
Added: April 23, 2019
image from 2019 Tax Season Threat Roundup

2019 Tax Season Threat Roundup

This unique report takes a hard look at scams that focus on tax reporting and the filing of taxes.

Added: April 19, 2019
image from 2019 SANS Automation & Integration Survey

2019 SANS Automation & Integration Survey

Automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue, all caused by an increasing number of destructive threats. Yet, 59% of survey respondents indicate that their organizations use low levels or no automation of key security and incident response (IR) tasks. In this new SANS survey, we wanted to understand and explore some of the misconceptions versus facts around automation and what to do about it.

(more available)
Added: April 19, 2019
image from State of the Internet: Credential Stuffing - Attacks and Economies

State of the Internet: Credential Stuffing - Attacks and Economies

In this report, we’re going to give you an overview of the credential stuffing attacks in 2018 against the aforementioned sectors and look at the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.

(more available)
Added: April 19, 2019
  • ««
  • «
  • 38
  • 39
  • 40
  • 41
  • 42
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 8, 2025 04:08 UTC (build b1d7be4)