Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Annual Cyberthreat Landscape Report 2018

Annual Cyberthreat Landscape Report 2018

Guided by Threat Compass, the Blueliv’s Annual Cyberthreat Landscape Report takes a birds-eye view of the major events and trends of last year. The Threat Intelligence analysts at Blueliv then offer their insight into an ever-more sophisticated cybercrime industry for 2018.

(more available)
Added: December 4, 2018
image from The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

The ISACA/CMMI Institute Cybersecurity Culture Report: Narrowing The Culture Gap For Better Business Results

This paper aims to provide help in understanding how to better the cybersecurity culture in an organization.

Added: December 4, 2018
image from Online Malware and Threats A Profile of Today’s Security Posture

Online Malware and Threats A Profile of Today’s Security Posture

From the report, “Our survey examined the most common malware threats that organizations are grappling with, how often those threats result in actual compromises, and the challenges involved in responding to them. Respondents included CIOs, CTOs, CSOs, IT directors, network administrators, and senior executives from organizations in more than 20 industries.”

(more available)
Added: November 29, 2018
image from 2018 Threat Intelligence Report

2018 Threat Intelligence Report

“Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs. Among the key findings of the report are that organizations are leveraging threat intelligence data for a number of use cases, and many rate themselves fairly competent in their use of threat intelligence to identify and remediate cyber threats. The most common benefits of threat intelligence platforms include better threat analysis, faster detection and response, more efficient security operations, and better visibility into threats.”

(more available)
Added: November 29, 2018
image from WannaCry: One Year Later

WannaCry: One Year Later

“Despite the massive impact the WannaCry ransomware attack had on businesses across the globe and the immediate changes to security practices following it, a year later businesses still have a reactive approach and struggle to implement comprehensive security policies that target employees and management. With cyber threats evolving so rapidly, businesses need to learn how to be quick on their toes and expedite the development and enforcement of cyber security policies to better prevent future breaches.”

(more available)
Added: November 29, 2018
image from NotPetya: One Year Later

NotPetya: One Year Later

“Almost immediately following the WannaCry cyberattack, the NotPetya malware affected countries and organisations around the globe that had strikingly similar repercussions and lessons to take away. This attack exemplified the chronic failings organisations and nation-states continue to have despite the blatant and ongoing threats cyberspace poses. With cyber threats remaining a critical issue for organisations, there is still a great deal organisations need to do to mitigate these for future resilience.”

(more available)
Added: November 29, 2018
image from Cyber Threat Landscape: The Healthcare Industry

Cyber Threat Landscape: The Healthcare Industry

“Organizations in the healthcare industry have been in the news a number of times in recent years as a result of significant cyber attacks. In 2017, WannaCry made global headlines as its impact to the UK’s National Health Service (NHS) became known. Other attacks have seen health records stolen or ransoms paid to keep critical systems online at hospitals. Understanding the nature of the threats to the healthcare industry helps define effective ways to counter these threats and help to prevent them from making future headlines.”

(more available)
Added: November 29, 2018
image from Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

Cyber Threat Brief: US Recognizes Jerusalem As Capital Of Israel

This report takes a look at the cyber threats that occurred when the US recognized Jerusalem as the Capital of Israel.

(more available)
Added: November 29, 2018
image from Cybersecurity Profile: The United States Of America

Cybersecurity Profile: The United States Of America

This report offers insight into the cyber security profile of the United States Of America.

Added: November 29, 2018
image from Threatscape Of The US Election

Threatscape Of The US Election

From the report, “The cyber attacks targeting political elections is in full swing as the 115th United States midterm elections grow closer. The exploitation of vulnerabilities and direct cyber attacks targeting election-related entities are somewhat expected; however, a different form of cyber attack has the potential to have a disruptive impact to the elections: disinformation campaigns. The use of disinformation tactics in today’s social media-obsessed society is the most prominent threat to the democratic process. This form of attack is at a significant and troublesome level that the average voter may not be fully aware of.” Read on to learn more.

(more available)
Added: November 29, 2018
image from Peering Over The DAX 100 Threat Horizon

Peering Over The DAX 100 Threat Horizon

This report offers insight into the German DAX 100 Threat Horizon.

Added: November 29, 2018
image from The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The Recent Escalation Between Turkey And The U.S. Provokes Response From Cyber Groups

The recent escalation in tensions between the United States and Turkey over the detention of pastor Andrew Brunson, have prompted Turkish patriotic hacktivist groups to target American websites. Historically, the two most prominent hacktivist groups Aslan Neferler Tim (ANT) and Turk Hack Team (THT) have reacted to political issues impacting Turkey, by targeting the perceived adversary with low level nuisance attacks such as web defacements and Distributed Denial of Service attacks (DDoS). As the political situation deteriorates, Anomali expects to see an increase in hacktivist related activity targeting American websites.

(more available)
Added: November 29, 2018
image from Cyber Threat Brief: The 2018 FIFA World Cup

Cyber Threat Brief: The 2018 FIFA World Cup

Russia will host the 2018 FIFA World Cup from 14 June to 15 July 2018 at 12 different venues throughout 11 host cities, and thousands of foreign visitors are expected to travel to the games. With major sporting events increasingly targeted by physical and cyber threats, we believe that FIFA and their affiliates, spectators, athletes, officials, or other attendees are likely to be confronted by a range of security risks such as protests/demonstrations, hooliganism, financial fraud, and to a lesser extent hacktivism, terrorism, and cyber espionage.

(more available)
Added: November 29, 2018
image from Translating Security Leadership into Board Value

Translating Security Leadership into Board Value

A thought piece on trends that are occuring at the senior leadership levels of security professionals. Some survey data is refererenced, though it is unclear if a new survey was conducted for some of the trends identified in this report.

(more available)
Added: November 27, 2018
image from Taming Cybersecurity Regulation Mayhem

Taming Cybersecurity Regulation Mayhem

Cybersecurity incidents are increasing at astonishing rates with no end in sight. The impact of these incidents in business disruption, cost and invasion of individual privacy has provoked a groundswell of legislation and government regulation across the globe. With new regulations coming fast and furious, security professionals are often in uncharted territory, forced to juggle conflicting goals of security and privacy on one side and business growth and innovation on the other—and all under the umbrella of compliance and monitoring. Read on to learn more helpful information.

(more available)
Added: November 27, 2018
image from The CISO's Guide To Cybersecurity Risk Management and Measurement

The CISO's Guide To Cybersecurity Risk Management and Measurement

This report provides new mindsets and methods for measuring and minimizing business risk.

Added: November 27, 2018
image from The 2018 Identity Report

The 2018 Identity Report

This paper provides information about a comprehensive identity governance strategy. It offers a unique perspective on how an enterprise can gauge their identity strategy, and reduce risk in the organization.

(more available)
Added: November 27, 2018
image from 2018 Market Pulse Survey

2018 Market Pulse Survey

SailPoint’s 2018 Market Pulse Survey found amidst all the change the corporate world is experiencing – digital transformation is top of mind for many organizations – the way people approach security has not changed dramatically. People still have bad habits when it comes to both corporate and personal security, and some are even actively fighting against their organization’s IT department in the search for efficiency. Complicating the situation even more is the development of new threat avenues such as software bots. Read on to learn more.

(more available)
Added: November 27, 2018
image from Top Consumer Authentication Pitfalls To Avoid

Top Consumer Authentication Pitfalls To Avoid

Digital businesses must manage, govern, and secure customers’ access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also increase the number of potentially confusing consumer authentication experiences. As a result, they’re hemorrhaging customers and suffering increased support costs related to password and authentication. This report outlines 10 barriers to authentication success — and how S&R pros can improve online security without sacrificing experience.

(more available)
Added: November 27, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). This paper will touch on legislation and best practice recommendations in these jurisdictions without going into the details of specific laws.

(more available)
Added: November 27, 2018
image from Identity Security Trends In The Mobile Era

Identity Security Trends In The Mobile Era

To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed light on four main insights into the top challenges and motivations for enterprise mobile initiatives.

(more available)
Added: November 27, 2018
  • ««
  • «
  • 51
  • 52
  • 53
  • 54
  • 55
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 00:08 UTC (build b1d7be4)