Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from UK Active Cyber Defence

UK Active Cyber Defence

The key findings of this report are; 1) Active Cyber defence has significant potential in helping improve UK national cybersecurity 2) Active Cyber defence can play a powerful role in shaping the cybersecurity marketplace and furthering the interests of UK internet users and consumers 3) Active Cyber defense is a potentially useful model for export to like-minded countries 4) Active Cyber defense may constitute an emergent public good 5)Active cyber defense is not perfect, nor should we expect it to be.

(more available)
Added: January 31, 2019
image from State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

State of the Internet/security Volume 5, Issue 1: DDOS and Application Attacks

The report covers a variety of issues but offers these key findings, Sometimes an “attack” isn’t exactly what it first appears to be, Bots are big money for attackers and they’re constantly evolving, Mental health issues cost U.S. businesses more than $190 billion a year in lost earnings. Read on for more information.

(more available)
Added: January 31, 2019
image from The 2019 State of Password and Authentication Security Behaviors Report

The 2019 State of Password and Authentication Security Behaviors Report

The purpose of this study is to understand the beliefs and behaviors surrounding password management and authentication practices for individuals both in the workplace and at home. The goal was to understand if these beliefs and behaviors align, and why or why not. The conclusion is that despite the increasing concern regarding privacy and protection online and a greater understanding of the best security practices, individuals and businesses are still falling short.

(more available)
Added: January 31, 2019
image from The Changing Face of Online Banking and Financial Fraud

The Changing Face of Online Banking and Financial Fraud

This report seeks to review the dramatic changes that took place in the banking industry in 2018, and lay out a strategy for those institutions in 2019.

(more available)
Added: January 31, 2019
image from EMA Radar for Digital Threat Intelligence Management: Q4 2017

EMA Radar for Digital Threat Intelligence Management: Q4 2017

This report offers insight into digital threat intelligence management.

Added: January 31, 2019
image from Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

Summary of Reports Issued Regarding Department of Defense Cybersecurity from July 1, 2017, Through June 30, 2018

From the report, “DOur objective was to (1) summarize unclassified and classified reports issued and testimonies made from the DoD oversight community and the Government Accountability Office (GAO) between July 1, 2017, and June 30, 2018, that included DoD cybersecurity issues; (2) identify cybersecurity risk areas for DoD management to address based on the five functions of the National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity,” April 16, 2018 (Cybersecurity Framework); and (3) identify the open DoD cybersecurity recommendations. This summary report also addresses the Federal Information Security Modernization Act of 2014 (FISMA) requirement to provide an annual independent evaluation of the agency’s information security program by using the identified findings to support the responses made in our assessment.”

(more available)
Added: January 31, 2019
image from Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

This Impact Report provides insights into consumers’ views on authentication. Consumers often don’t understand the mechanics of technologies very well, or even why they’re being used, but they have definite preferences about how and when they want to engage in authentication activities.

(more available)
Added: January 31, 2019
image from The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

The Changing Face of Data Security:2019 Thales Data Threat Report Global Edition

This report is based on a global IDC Web-based survey of 1,200 executives with responsibility for or influence over IT and data security. Respondents were from nine countries: Australia, Germany, India, Japan, the Netherlands, New Zealand, the UK, and the U.S., and represented a range of industries, with a primary emphasis on healthcare, financial services, retail, and federal government organizations. Job titles ranged from C-level executives including CEO, CFO, Chief Data Officer, CISO, Chief Data Scientist, and Chief Risk Officer, to SVP/VP, IT Administrator, Security Analyst, Security Engineer, and Systems Administrator. Respondents represented a broad range of organizational sizes, with the majority ranging from 500 to 10,000 employees

(more available)
Added: January 31, 2019
image from Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

Unmasking Synthetic Identites: Exposing the Real Fraudster Behind the Fabricated Persona

From the report, “Widespread data breaches, the EMV migration, and efforts to extend the longevity of the SSN, have created an ideal environment in which synthetic identity fraud is flourishing. Furthermore, consumers’ physical and digital footprints are becoming more complicated, meandering across locations, devices, and geographies. This makes it more difficult than ever to differentiate legitimate user behavior from fraudsters. Businesses need to prevent synthetic identities from entering their ecosystems by understanding anomalies to individual user behavior and helping to correlate the seemingly disconnected events and security incidents in real time. Combining historical and real-time data and leveraging machine learning to analyze individual behavior across channels can reveal complex patterns to help detect and block synthetic identities without causing friction for real customers.”

(more available)
Added: January 30, 2019
image from The State Of IOT Security

The State Of IOT Security

This report offers the following taglines - IoT device breaches undetectable by nearly half of companies, and use of blockchain technology to help secure IoT data, devices and services doubles in a year.

(more available)
Added: January 30, 2019
image from State Of IOT Security: Infographic

State Of IOT Security: Infographic

This Infographic offers a brief presentation of the data presented in the Gemalto 2018 State of IOT Security.

Added: January 30, 2019
image from ThreatMetrix Cybercrime Report

ThreatMetrix Cybercrime Report

The ThreatMetrix Payment Processor Cybercrime Report is based on actual cybercrime attacks last year that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Gaming & Gambling Report

Q2 2018 Gaming & Gambling Report

The ThreatMetrix Gaming and Gambling Cybercrime Report is based on actual cybercrime attacks in Q2 2018 that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q2 2018 Cybercrime Report

Q2 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q2 2018 is based on actual cybercrime attacks from April – June 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q1 2018 Cybercrime Report

Q1 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2018 Cybercrime Report: Europe DeepDive

2018 Cybercrime Report: Europe DeepDive

The ThreatMetrix European Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report 2017: A Year In Review

Cybercrime Report 2017: A Year In Review

This report offers insight into the cybercrime events of 2017.

Added: January 30, 2019
image from Q4 2017 Cybercrime Report

Q4 2017 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q4 2017 is based on actual cybercrime attacks from October – December 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Q3 Cybercrime Report

2017 Q3 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q3 2017 is based on actual cybercrime attacks from July – September 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. • The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 51% of which originate from mobile devices. • These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. • The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. • ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. • Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
image from 2017 Q2 Cybercrime Report

2017 Q2 Cybercrime Report

Cybercrime continues to grow, with organizations being attacked more than ever before. ThreatMetrix detected and stopped 144 million attacks this quarter and 300 million bot attacks. The complex, networked nature of cybercrime attacks can be seen in the following key trends analyzed this quarter: • The evolution of emerging economies in the cybercrime landscape as identity data trickles down to all regions of the globe following large-scale breaches • The regional variations in attack vector trends, with South America emerging as a hub for new account origination fraud • The emergence of highly organized criminal gangs targeting multiple organizations within the ThreatMetrix Network • The rise in mobile attack rates as attackers turn their attention towards the growing mobile economy

(more available)
Added: January 30, 2019
image from 2017 Q1 Cybercrime Report

2017 Q1 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2017 is based on actual cybercrime attacks from January – March 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 45% of which originate from mobile devices. These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
  • ««
  • «
  • 46
  • 47
  • 48
  • 49
  • 50
  • »
  • »»
© Cyentia Institute 2025
Library updated: August 9, 2025 04:09 UTC (build b1d7be4)