Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from The Future Of Email Security In The Cloud

The Future Of Email Security In The Cloud

This white paper will guide security teams as they reexamine their approach to cloud-based email.

Added: April 19, 2019
image from Cyber Security: For Defenders, It's About Time

Cyber Security: For Defenders, It's About Time

In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In a recent report, Aberdeen Group leveraged Verizon Data Breach Investigations Report data to uncover the distribution of attacker “dwell times,” i.e., the total time in days from attacker compromise to defender detection.

(more available)
Added: April 19, 2019
image from The Cost Of Third-Party Cybersecurity Risk Management

The Cost Of Third-Party Cybersecurity Risk Management

CyberGRX and Ponemon Institute surveyed over 600 IT security professionals to learn more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today. The survey respondents come from a variety of industries and are all involved in managing their organizations’ third-party cyber risk management programs (TPCRM). All organizations represented in the study have TPCRM programs and believe it is critical to have cybersecurity risk management controls in place

(more available)
Added: April 19, 2019
image from Privileged Access Management In The Modern Threatscape

Privileged Access Management In The Modern Threatscape

Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it

(more available)
Added: April 19, 2019
image from 2018 Cloud Security Report

2018 Cloud Security Report

This report has been produced by the 400,000 member Information Security Community on LinkedIn in partnership with Cybersecurity Insiders to explore how organizations are responding to the security threats in the cloud, and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

(more available)
Added: April 4, 2019
image from 2018 Application Security Report

2018 Application Security Report

This report is the result of a comprehensive survey of 437 cybersecurity professionals designed to reveal the latest application security trends, how organizations are protecting applications, and what tools and best practices IT cybersecurity teams are prioritizing to find, fix and prevent vulnerabilities in next-gen applications.

(more available)
Added: April 4, 2019
image from Mobile Security & BYOD Report

Mobile Security & BYOD Report

Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. As mobility grows in the workplace, so do challenges from managing device access to handling the most pressing concerns of mobile security. The 2018 Mobile Security Report focuses on these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with enterprise mobility.

(more available)
Added: April 4, 2019
image from 2018 Endpoint Security Report

2018 Endpoint Security Report

The 2018 Endpoint Security Report reveals the latest endpoint security trends and challenges, why and how organizations invest in endpoint security, and the security capabilities companies are prioritizing.

(more available)
Added: April 4, 2019
image from 2018 Managed Security Report

2018 Managed Security Report

The 2018 Managed Security Report is based on the results of a comprehensive online survey of IT and cybersecurity professionals conducted in July and August of 2018.

(more available)
Added: April 4, 2019
image from HUAWEI CYBER SECURITY EVALUATION CENTRE (HCSEC) OVERSIGHT BOARD ANNUAL REPORT 2019

HUAWEI CYBER SECURITY EVALUATION CENTRE (HCSEC) OVERSIGHT BOARD ANNUAL REPORT 2019

This is the fifth annual report from the Huawei Cyber Security Evaluation Centre (HCSEC) Oversight Board. HCSEC is a facility in Banbury, Oxfordshire, belonging to Huawei Technologies (UK) Co Ltd (Huawei UK), whose parent company, Huawei Technologies Co Ltd, is a Chinese headquartered company which is now one of the world’s largest telecommunications providers.

(more available)
Added: April 4, 2019
image from The Cost Of Cybercrime

The Cost Of Cybercrime

The ninth annual cost of cybercrime study helps to quantify the economic cost of cyberattacks by analyzing trends in malicious activities over time.

(more available)
Added: April 4, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm’s investment approach to these technologies.

(more available)
Added: March 26, 2019
image from Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

Management Alert - FEMA Did Not Safeguard Disaster Survivors' Sensitive Personally Identifiable Information (REDACTED)

This alert contains two recommendations directing actions Federal Emergency Management Agency (FEMA) should take to safeguard both Personally Identifiable Information (PII) and Sensitive Personally Identifiable Information (SPII) of disaster survivors and prevent additional privacy incidents similar to one we identified during our ongoing audit of FEMA’s Transitional Sheltering Assistance (TSA) program. FEMA concurred with both recommendations.

(more available)
Added: March 26, 2019
image from DLA Piper GDPR Data Breach Survey: February 2019

DLA Piper GDPR Data Breach Survey: February 2019

This report takes a closer look at the number of breaches notified to regulators and the first fines issued under the new GDPR regime for the period from May 25, 2018, to January 28, 2019 - international Data Protection Day

(more available)
Added: March 26, 2019
image from Rating Companies on Third-Party Cyber Risk

Rating Companies on Third-Party Cyber Risk

This report offers insight into the need for a cyber risk ratings system.

Added: March 26, 2019
image from Cryptocurrency Anti-Money Laundering Report 2018 Q4

Cryptocurrency Anti-Money Laundering Report 2018 Q4

This report begins with an interesting paragraph, “Bad actors need to launder the $US 1.7 billion of cryptocurrency stolen and scammed in 2018. Furthermore, they need to get it all done before tough new global anti-money laundering (AML) and counter terror financing (CTF) regulations go into effect over the next year.” Read on to learn how this paragraph is important.

(more available)
Added: March 26, 2019
image from Healthcare Breach Report 2019

Healthcare Breach Report 2019

Bitglass’ fifth annual Healthcare Breach Report analyzes the data from the US Department of Health and Human Services’ “Wall of Shame.” The database contains information about breaches of PHI that affected more than 500 individuals.

(more available)
Added: March 26, 2019
image from Would You Be Ready For A Cyber Attack?

Would You Be Ready For A Cyber Attack?

Business in the Community is delighted to present this report, which confirms where we all can play a role in better online security and how we – business leaders, think tanks, government – can achieve this. We encourage CEOs and business owners of all sizes to take actions after reading this report. If you are a small business owner, we hope it inspires you to implement the recommendations to be safer online. For larger businesses, we hope you will consider joining our call to action. By working together, we will be a step closer to achieving the National Cyber Security Centre’s vision to help: “make the UK the safest place to live and do business online”.

(more available)
Added: March 26, 2019
image from Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

Striking Security Gold: Uncovering Hidden Insights in a decade's worth of RSA Conference abstracts

From the report, “But what exactly do we talk about when we talk “security?” That’s the question we seek to answer in this report, which has its roots in a similar question asked by an eight-year-old daughter two and a half years ago: “What’s the RSA Conference about, Daddy?” That root sprouted into a four-part blog series and a panel discussion a year later where we analyzed 25 years of session titles in honor of the 25th anniversary of RSA Conference.”

(more available)
Added: March 16, 2019
image from 7 Most Unsafe Gaps For Industrial Cyber Security

7 Most Unsafe Gaps For Industrial Cyber Security

Indegy provides a helpful graphic designed to reveal seven critical areas in the area of industrial cyber security.

Added: March 16, 2019
image from Declassified: Unraveling The Cyber Skills Gap & Talent Shortage

Declassified: Unraveling The Cyber Skills Gap & Talent Shortage

This report shares findings from a survey conducted of more than 3,100 IT, security and other non-technical professionals. It explores their learning habits, levels of personal and organizational preparedness, and factors that improve their confidence and defensive capabilities. If the key findings below resonate with challenges facing your organization, then you will definitely want to add this to the top of your reading list.

(more available)
Added: March 16, 2019
  • ««
  • «
  • 39
  • 40
  • 41
  • 42
  • 43
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 8, 2025 04:08 UTC (build b1d7be4)