Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from 2017 Gaming and Gambling Cybercrime Report

2017 Gaming and Gambling Cybercrime Report

This report offers these key insights: 49% of all transactions analyzed in gaming and gambling come from a mobile device, Identity spoofing remains the biggest threat to the industry, and Automated bot attacks can account for around half of daily gaming/gambling traffic during periods of peak attacks.

(more available)
Added: January 30, 2019
image from 2017 APAC Cybercrime Report

2017 APAC Cybercrime Report

This report offers insight into the Asia-Pacific region and the cybercrimes that are growing and continuing to occur in the area.

(more available)
Added: January 30, 2019
image from Q4 2016 CyberCrime Report

Q4 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q4 2016 is based on actual cybercrime attacks from October – December 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q3 2016 CyberCrime Report

Q3 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q3 2016 is based on actual cybercrime attacks from July 2016 – September 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q3 2016 Cybercrime Report APAC DeepDive

Q3 2016 Cybercrime Report APAC DeepDive

APAC continues to be an exciting region of huge growth, evolution and change; increasing its vulnerability to organized, global cyber attacks. This is particularly true given APAC has a particularly strong cross-border footprint, with a high proportion of digital transactions criss-crossing country boundaries. Cross-border transactions are considered riskier by most organizations, driven by the fact that they are far more likely to be automated bot attacks than domestic transactions, and attract higher instances of location spoofing, as fraudsters attempt to hide behind VPNs and proxies to mask their true location.

(more available)
Added: January 30, 2019
image from Q2 2016 Cybercrime Report

Q2 2016 Cybercrime Report

This is ThreatMetrix’s Report of events from the second quarter of 2016.

Added: January 30, 2019
image from Q2 2016 Cybercrime Report: Europe Deepdive

Q2 2016 Cybercrime Report: Europe Deepdive

This report from ThreatMetrix compiles the data from their 2016 Cybercrime report to provide insight into the threats in the European sector.

(more available)
Added: January 30, 2019
image from Q1 2016 Cybercrime Report

Q1 2016 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2016 is based on actual cybercrime attacks from January 2016 – March 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Creating Value and Managing Risk in the World of PSD2

Creating Value and Managing Risk in the World of PSD2

Creating)Value)and)Managing)Risk)in)the)World)of)PSD2,“a"white"paper"developed"by"Aite"Group” in close cooperation with ThreatMetrix, provides insight into the key provisions of the revised & Payment(Service(Directive (PSD2) legislation and its impact on market practices.

(more available)
Added: January 30, 2019
image from 2017 Most Notable Hackers

2017 Most Notable Hackers

In 2017 we saw a measurable increase in cyber attacks executed by State sponsored hacking groups and APT’s. The Top 5 Threat Actors highlighted in this report carried out some of the most notable and financially devastating attacks of 2017 and are likely sponsored by nation-states. Cyber-attacks have become, and will continue to be, key elements of twenty-first century political warfare and terrorism. We believe that the use of cyber terror and other state sponsored attacks will increase in 2018 after it’s success in 2017.

(more available)
Added: January 25, 2019
image from Chronic [Cyber] Pain: Exposed & Misconfigured Databases in the Healthcare Industry

Chronic [Cyber] Pain: Exposed & Misconfigured Databases in the Healthcare Industry

A first hand account of using open source intelligence techniques to discover publicly exposed data stores of healthcare information.

Added: January 25, 2019
image from 10 Things About The Dark Web You Probably Didn't Know

10 Things About The Dark Web You Probably Didn't Know

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from the prying eyes of the public and law enforcement. But is that really what it’s like, or is that just cybersecurity marketing hype?

(more available)
Added: January 25, 2019
image from The 5 Stages of DevOps Evolution: A Guide For CIOs

The 5 Stages of DevOps Evolution: A Guide For CIOs

From the report, “This year we designed our DevOps survey to reveal what successful organizations actually do as they progress on their DevOps journeys. We discovered that they experience five distinct stages of DevOps evolution, which we have shared in full detail in our 2018 State of DevOps Report. This CIO guide digests our research into a report that’s just for you. We want to help you quickly understand what successful organizations do at each stage of DevOps evolution; which practices must be established at each stage (we call these the defining practices); and how you can best support your team throughout its DevOps journey to assure continuing progress and success.”

(more available)
Added: January 24, 2019
image from Securing The Digital Economy: Reinventing The Internet For Trust

Securing The Digital Economy: Reinventing The Internet For Trust

From the report, “Without trust, the future of our digital economy and its nearly limitless potential is in peril. Piecemeal efforts to address cybersecurity issues—including the Internet’s inherent flaws, vulnerabilities from the Internet of Things (IoT), identity and data veracity and increasing digital fragmentation—have fallen short. Through their decisions above ground on industry-wide governance and their business architecture and technology infrastructure below ground, however, CEOs can have the influence necessary to collaboratively address these overarching issues.”

(more available)
Added: January 24, 2019
image from The State of Enterprise Encryption and How to Improve It

The State of Enterprise Encryption and How to Improve It

A new survey by UBM and Vera Security explores the use of encryption and access controls to understand how organizations currently use these technologies and to identify their top priorities in file security. The results of this research establish the reasons why encryption isn’t more widely used and considers how organizations can use this technology effectively to ensure the protection of their data.

(more available)
Added: January 17, 2019
image from The Modality of Mortality in Domain Names

The Modality of Mortality in Domain Names

Domain names are normatively registered for one or more years, and faithfully renewed thereafter. Domains slated for abusive uses, however, are effectively disposable: they are registered, quickly abused for cybercrime, and abandoned. In this study, we monitor an ongoing data feed of newly observed domains (NOD) to generate a cohort data set, and periodically probe those names to determine what fraction of new domains get suspended by their registrar, deleted by the DNS provider, or effectively ‘killed’ by several well-known blocklists. We then analyse how quickly this happens, the most likely cause of domain ‘death’, and how this may vary depending on the TLD involved. The study provides the first systematic study of domain lifetimes, unravelling their complexities and showing the impact of blocklists on the new gTLDs. The results can be used to deploy more secure DNS policy rules in a computer network.

(more available)
Added: January 16, 2019
image from 2018 Secure DevOps: Fact Or Fiction?

2018 Secure DevOps: Fact Or Fiction?

This survey, the sixth in a series of annual studies by SANS on security practices in software development, is the first to explicitly focus on DevOps. The results of this study show that organizations are finding ways to keep up with rapid change through DevOp but they have a number of challenges they still need to deal with.

(more available)
Added: January 16, 2019
image from Global DNS Defense Report Q1/2018

Global DNS Defense Report Q1/2018

In this new research, Farsight Security selected the primary domain for nearly 4000 organizations, including leading global corporations and higher education institutions. We then tested those domains using key DNS indicators to assess adoption of emerging technologies and risk exposure.

(more available)
Added: January 16, 2019
image from A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice

A Stakeholder-centric Approach to Building a Cyber Threat Intelligence (CTI) Practice

How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders

Added: January 16, 2019
image from The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

To provide insights into the complex challenges faced by organizations as they fight to protect their brands, Radware produces an annual Global Application & Network Security Report. This eighth annual version of the report combines Radware’s organic research, real attack data and analyses of developing trends and technologies with the findings from a global industry survey.

(more available)
Added: January 16, 2019
image from DevSecOps Community Survey 2017

DevSecOps Community Survey 2017

This report offers insight into the DevSecOps Community.

Added: January 15, 2019
  • ««
  • «
  • 47
  • 48
  • 49
  • 50
  • 51
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 12:08 UTC (build b1d7be4)