Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from The Betterly Report Cyber Privacy Insurance Market Survey

The Betterly Report Cyber Privacy Insurance Market Survey

An annual review and evaluation of insurance products designed to protect against the unique risks of data security for organizations.

(more available)
Added: October 25, 2018
image from The State Of SOAR Report, 2018

The State Of SOAR Report, 2018

There is already a wealth of research that highlights the unending growth in security alerts, a widening security skills gap, and the ensuing fatigue that is heaped upon understaffed security teams. Demisto conducted a large study to delve deeper into these issues, their manifestations, and possible solutions. Their results yielded fascinating insights into the state of cybersecurity in businesses of all sizes.

(more available)
Added: October 25, 2018
image from Threat Intelligence Executive Report 2017: Volume 2

Threat Intelligence Executive Report 2017: Volume 2

This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools.

(more available)
Added: October 25, 2018
image from Threat Intelligence: Cyberattacks And The Utility Industry

Threat Intelligence: Cyberattacks And The Utility Industry

This report takes a look at how cyberattacks impact the utility industry.

Added: October 25, 2018
image from University of Kent Computing Survey

University of Kent Computing Survey

This is a report from Kent University in Canterbury, UK. It details the findings from their online survey which gives a better picture of the prevalence and impact of cybercrime victimization, cyber security practices, and risks as seen by a sample of the UK population.

(more available)
Added: October 25, 2018
image from Vendor Landscape Cloud Workload Security Solutions

Vendor Landscape Cloud Workload Security Solutions

As businesses continue to adopt both infrastructure-as-a-service (iaaS) and platform -as-a-service (PaaS) cloud platforms, S&r pros struggle to protect their organization’s valuable data while minimizing the threat surface of cloud and hybrid cloud workloads. Cloud workload security (CWS) solutions provide automated and layered controls to secure configurations, network, applications, and storage of hybrid cloud hypervisors and workloads. this report provides S&r pros with an overview of the CWS vendor landscape, critical selection criteria, and key vendor differentiation.

(more available)
Added: October 25, 2018
image from 2014 Trustwave Global Security Report

2014 Trustwave Global Security Report

Subtitled “Cyber Attacks: Can the Market Respond?”

Added: October 24, 2018
image from 2015 Breach Preparedness and Response Study

2015 Breach Preparedness and Response Study

In 2013, ISMG and FireEye teamed up to survey security leaders about advanced threats and breach response. Among the findings: Only 20 percent of respondents rated their incident response programs “very effective,” and they were most concerned about their abilities to detect and contain APT/malware quickly and completely.

(more available)
Added: October 24, 2018
image from 2015 First Half Review: Findings from the Breach Level Index

2015 First Half Review: Findings from the Breach Level Index

This is an in depth presentation of the data breaches that occurred in the first half of 2015. It contains very detailed graphics, charts, and analysis.

(more available)
Added: October 24, 2018
image from 2015 Global Cyber Impact Report

2015 Global Cyber Impact Report

The purpose of the research, in this report, is to understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 24, 2018
image from 2015 Polish Internet Security Landscape

2015 Polish Internet Security Landscape

This is a yearly report based on the activities of CERT Polska for the year 2015. Polish authorities, well aware of the dangers, commissioned this report containing proposals for the organization of the defenses system of the syberspace of the Republic of Poland.

(more available)
Added: October 24, 2018
image from 2016 Annual Security Report

2016 Annual Security Report

This report can help you learn how to become more resilient to new attacks and compete more safely in the digital age.

(more available)
Added: October 24, 2018
image from 2016 Cyber Threat Study

2016 Cyber Threat Study

This study, analyzes cyber threats from the years 2014 through 2016.

Added: October 24, 2018
image from 2016 Hacked Website Report Q2

2016 Hacked Website Report Q2

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 24, 2018
image from 2016 Outlook: Vulnerability Risk Management and Remediation Trends

2016 Outlook: Vulnerability Risk Management and Remediation Trends

This report, based on responses from nearly 200 IT and security practitioners surveyed, explores the current state of vulnerability risk management, the challenges that directly impact the remediation process, and the outlook for improvement in the coming year. In addition, compliance drivers and executive awareness of information security threats are considered to demonstrate their influence on effective vulnerability risk management.

(more available)
Added: October 24, 2018
image from 2017 Breach Briefing

2017 Breach Briefing

BBR Services is on the front-lines of breach management and has attained a wealth of cyber expertise and knowledge of emerging trends. From this vantage point we have compiled the 2017 Beazley Breach Briefing, which is based on our 2016 data and provides our unique insight into key trends in data breach causes including factors that impact costs of data breaches.

(more available)
Added: October 24, 2018
image from 2017 Security Operations Center Survey

2017 Security Operations Center Survey

This report discusses the Security Operations Center and how it is being architected in organizations with some consensus on what should be done. The paper details the issues and problems that need to be resolved as this area of expertise continues to grow.

(more available)
Added: October 24, 2018
image from 2018 Cost Of A Data Breach Study: Global Overview

2018 Cost Of A Data Breach Study: Global Overview

IBM Security and Ponemon Institute are pleased to release the 2018 Cost of Data Breach Study: Global Overview1. They conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.

(more available)
Added: October 24, 2018
image from 2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

2018 Global Threat Report:Blurring The Lines Between Statecraft and Tradecraft

The issues presented in this 2018 report are Targeted Intrusions, Criminal and Hacktivist Activity, and 2018 Predictions

Added: October 24, 2018
image from 7 Facts Every CISO Needs To Know About Open Source Security

7 Facts Every CISO Needs To Know About Open Source Security

This is an infographic that details things every CISO should know about Open Source Security.

Added: October 24, 2018
image from A Best Practices Guide For Comprehensive Employee Awareness Programs

A Best Practices Guide For Comprehensive Employee Awareness Programs

This guide seeks to aid organizations in creating an effective program for helping raise awareness in employees.

Added: October 24, 2018
  • ««
  • «
  • 60
  • 61
  • 62
  • 63
  • 64
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)