Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from LexisNexis Risk Solutions Fraud Mitigation Study: 2018

LexisNexis Risk Solutions Fraud Mitigation Study: 2018

Since 2015, LexisNexis Risk Solutions has administered an annual study to determine the extent to which fraud cases span multiple industries. The national online survey included 800 fraud mitigation professionals from five industry segments and government with oversight or direct involvement in fraud programs at their organizations. It has a margin of error of +/- three points (at the 95% confidence level), and LexisNexis was not identified as the research sponsor.

(more available)
Added: November 23, 2018
image from Law Firm Cybersecurity Scorecard Q4 2018

Law Firm Cybersecurity Scorecard Q4 2018

Data breaches have become a risk to every law firm throughout the world regardless of the number of attorneys, revenues or practice areas. The Law Firm Cybersecurity Scorecard is developed by LOGICFORCE and published regularly to educate the legal industry on the current state of cybersecurity preparedness.

(more available)
Added: November 23, 2018
image from The State Of Threat Detection Report 2018

The State Of Threat Detection Report 2018

Between April and July 2018, Fidelis conducted a study of 582 security professionals to evaluate the adoption of threat hunting practices and overall security posture strengths and weaknesses.

(more available)
Added: November 21, 2018
image from Economic Impact Of Cybercrime - No Slowing Down

Economic Impact Of Cybercrime - No Slowing Down

This report takes a deep look at the economics of Cybercrime.

Added: November 21, 2018
image from Cloud Adoption And Risk Report - 2019

Cloud Adoption And Risk Report - 2019

From the Report, “Through analysis of billions of anonymized cloud events across a broad set of enterprise organizations*, we can determine the current state of how the cloud is truly being used, and where our risk lies. Consider that nearly a quarter of data in the cloud is sensitive, and that sharing of sensitive data in the cloud has increased 53% year-over-year. If we don’t appropriately control access and protect our data from threats, we put our enterprises at risk.”

(more available)
Added: November 21, 2018
image from Prevention Is Better Than Cure: Business Security - The Journey Continues

Prevention Is Better Than Cure: Business Security - The Journey Continues

This year’s Risk:Value Report from NTT Security shows that there is still a lot of work to do. It crystallizes in one shocking statistic: one-third of companies would rather pay a hacker’s ransom than invest in information security. Many organizations are still stuck in a reactive mindset when it comes to security.

(more available)
Added: November 21, 2018
image from 2019 Global ICS & IIoT Risk Report

2019 Global ICS & IIoT Risk Report

This report provides a “data-driven analysis of vulnerabilities in our industrial and critical infrastructure.”

Added: November 21, 2018
image from CipherCloud Cloud Data Security Research

CipherCloud Cloud Data Security Research

In August 2018 CipherCloud completed a survey of key customers and cloud users that included responses from hundreds of enterprise corporations. This survey was designed to identify the key business drivers that were compelling to these users as justification for the protection of cloud data.

(more available)
Added: November 21, 2018
image from Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

Quarterly Incident Response Threat Report: Destructive Cyberattacks Increase Ahead of 2018 Midterm Elections

A trade war with China. A fragile agreement with North Korea. A growing fear of Russian hackers. Ahead of the 2018 U.S. midterm congressional elections, geopolitical conflict continues to play out in cyberspace.

(more available)
Added: November 21, 2018
image from Build Pervasive Cyber Resilience Now

Build Pervasive Cyber Resilience Now

This report posits that “Companies are racing into the digital future adopting technology enabled operating and business models that drive bottom- and top- line growth. They are not prepared for the new cyber risks that come with the connected, data-driven future enterprise.” Read on to learn about solutions.

(more available)
Added: November 21, 2018
image from Ransomware Attacks Surge And Ransom Demands rise

Ransomware Attacks Surge And Ransom Demands rise

In recent months, Beazley Breach Response (BBR) Services has seen the number of reported ransomware incidents climb again. The varieties of ransomware and the differing technical abilities of the criminals make effective response especially challenging. Breach response services, such as forensics and legal counsel, are often necessary in ransomware attacks to determine the attack vector and level of access obtained by the attacker. If the attacker accessed or exfiltrated personally identifiable information or protected health information, notification to affected individuals may be required by law.

(more available)
Added: November 21, 2018
image from State of Cybersecurity Report 2018

State of Cybersecurity Report 2018

The first edition of the “State of Cybersecurity report” was well received by customers, industry analysts and cybersecurity professionals. The 2018 edition of the Report maintains the same unique structure to build on the first edition’s ethos and bring in new viewpoints and findings. The rest of this section is reproduced from last year’s report for the benefit of first-time readers.

(more available)
Added: November 20, 2018
image from Small And Mighty

Small And Mighty

This special report provides a deep dive into the cybersecurity practices of small and midmarket businesses.

Added: November 20, 2018
image from The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers, and researched, analyzed, and scored them. This report shows how each provider measures up to help security leaders make the right choice.

(more available)
Added: November 20, 2018
image from 2019 Forcepoint Cybersecurity Predictions Report

2019 Forcepoint Cybersecurity Predictions Report

In the 2019 Forcepoint Cybersecurity Predictions Report, we explore the impact of businesses putting their trust in cloud providers to protect their data, the impact of end-user trust in those securing personal biometric data, the cascading of trust into the supply chain to protect any critical data in their custodianship, and trust in algorithms and analytics successfully piloting automobiles and alerting security professionals to potential data loss incidents.

(more available)
Added: November 20, 2018
image from 2017 Threat Report

2017 Threat Report

This report contains an overview of the threat trends and malware families Cylance’s customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.

(more available)
Added: November 20, 2018
image from The Healthy Approach To Cyber Security

The Healthy Approach To Cyber Security

This report outlines key findings from the 2017 KPMG/Forbes Insights CyberSecurity Survey of 100 senior executives from the healthcare field. [One-hundred senior life sciences executives were surveyed as well.] The findings indicate that companies are elevating cyber security to a strategic imperative but at a pace that lags behind their desire to adopt digital technologies to drive innovation. To illustrate, we take a look at the current and desired states of cyber security in healthcare through the lenses of data sharing, vendor management, and medical device implementation. We conclude with our guidance on where organizations should be focusing their efforts.

(more available)
Added: November 20, 2018
image from Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

This special report provides information related to the Harbinger of a U.S. National Data Protection Law.

Added: November 20, 2018
image from Vulnerability Intelligence Report

Vulnerability Intelligence Report

In this report, they provide an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. they analyze vulnerability prevalence in the wild, based on the number of affected enterprises, to highlight vulnerabilities that security practitioners are dealing with in practice - not just in theory.

(more available)
Added: November 16, 2018
image from The Cost of Malicious Cyber Activity to the U.S. Economy

The Cost of Malicious Cyber Activity to the U.S. Economy

This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are ever-evolving and may come from sophisticated adversaries. Due to common vulnerabilities, instances of security breaches occur across firms and in patterns that are difficult to anticipate. Importantly, cyberattacks and cyber theft impose externalities that may lead to rational underinvestment in cybersecurity by the private sectorrelative to the socially optimal level of investment. Firms in critical infrastructure sectors may generate especially large negative spillover effects to the wider economy. Insufficient data may impair cybersecurity efforts. Successful protection against cyber threats requires cooperation across firms and between private and public sectors.

(more available)
Added: November 16, 2018
image from Risk Management Playbook

Risk Management Playbook

The Third-Party Security Risk Management Playbook (Playbook) is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party cyber risk, distilled into 14 capabilities with 72 common, emerging, and pioneering practices.

(more available)
Added: November 16, 2018
  • ««
  • «
  • 53
  • 54
  • 55
  • 56
  • 57
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 16:08 UTC (build b1d7be4)