Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Blackmoon Banking Trojan Overview

Blackmoon Banking Trojan Overview

The Blackmoon Banking Trojan was thought to be shut down in 2016. However, it has re-emerged. This paper provides a brief analysis of the revamped trojan.

(more available)
Added: October 24, 2018
image from CISO Insights: 7 Best Practices For A Successful Insider Threat Program

CISO Insights: 7 Best Practices For A Successful Insider Threat Program

In this report, 15 CISOs identified some practical steps that may help remedy some of the challenges many of organizations experience when developing and implementing an insider threat program.

(more available)
Added: October 24, 2018
image from Cloud Security Trends Report Infographic February 2018

Cloud Security Trends Report Infographic February 2018

This is an infographic that summarizes the Redlock report of the same name.

Added: October 24, 2018
image from Cybercrime - Do You Have it Covered?

Cybercrime - Do You Have it Covered?

This paper looks at the cyber insurance market, the need for expert advice and the steps that organizations can take to ensure that they fully understand their own data risks and security vulnerabilities before taking out a policy.

(more available)
Added: October 24, 2018
image from Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

Cybersecurity Insights Volume 2: The CEO's Guide To Securing The Internet Of Things

This report tackles security issues related to the Internet Of Things.

Added: October 24, 2018
image from Cybersecurity The Innovation Accelerator

Cybersecurity The Innovation Accelerator

This report takes a look at how strong cyber security and business decision-making inspire growth and innovation.

Added: October 24, 2018
image from Cybersecurity Threatscape 2017

Cybersecurity Threatscape 2017

This annual report details the cybersecurity trends and threats of 2017.

Added: October 24, 2018
image from Database Discovery: Identifying Hidden Risks and Sensitive Data

Database Discovery: Identifying Hidden Risks and Sensitive Data

Keeping track of databases, and the associated data they host, turns out to be a significant challenge. This white paper presents a detailed approach to understanding the difficulties related to database discovery, and some solutions to those problems.

(more available)
Added: October 24, 2018
image from Definitive Guide To AWS

Definitive Guide To AWS

This is an eBook that discusses securing ata on Amazon Web Services (AWS).

Added: October 24, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. Recent data breaches and ransomware attacks in the newspaper highlight that governments of all sizes are indeed being targeted and have fallen victim to hackers. State and local governments must be prepared to stop internal and external threats alike. The mix of legacy equipment and small IT and security staffs relative to private industry can create a pressure- filled situation.”

(more available)
Added: October 24, 2018
image from Healthcare And Life Sciences: Closing The SaaS Security Gap

Healthcare And Life Sciences: Closing The SaaS Security Gap

This paper seeks to help improve the IT situation in the Healthcare industry.

Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from Insuring The Future: 2018 State Of Cyber Resilience For Insurance

Insuring The Future: 2018 State Of Cyber Resilience For Insurance

“Across all technologies and capabilities examined in the survey, about 80 percent or more of insurance executives are “confident” or “extremely confident” about their effectiveness. That might seem reasonable given the progress, but a case can be made that leadership is overconfident. Attackers are becoming increasingly sophisticated and attacks can shut down the business or expose customer data. If about one in five attempted breaches is successful, that’s still a lot of breaches. And, given the findings that 45 percent of breaches are not detected for more than a week (9 percent require more than a month), that’s a lot of risk exposure.”

(more available)
Added: October 24, 2018
image from IoT Security:An IBM Position Paper

IoT Security:An IBM Position Paper

This paper takes a look at how cognitive technologies will impact security in the IoT systems. It addresses a variety of issues related to CIoT and the future that lies ahead.

(more available)
Added: October 24, 2018
image from Is Cyber Risk Systemic?

Is Cyber Risk Systemic?

In this report, they examine the results of a survey that attempted to provide a deeper understanding of the views of the likelihood and impact of a systemic cyber-attack.

(more available)
Added: October 24, 2018
image from Left Of Breach 2018

Left Of Breach 2018

Using a unique approach, this paper offers insight into how using a technique of Marine strategy can protect your company from Phishing attacks.

(more available)
Added: October 24, 2018
image from Paradigm Shifts:TrendMicro Security Predictions For 2018

Paradigm Shifts:TrendMicro Security Predictions For 2018

This report offers Security Predictions for 2018

Added: October 24, 2018
image from Preparing For A Cyber Breach: Forewarned Is Forearmed

Preparing For A Cyber Breach: Forewarned Is Forearmed

This paper will help organizations prepare for a cyber-breach and provides an outline plan to help cope with the situation. A plan will prevent panic – the last thing needed while undergoing a security incident.

(more available)
Added: October 24, 2018
image from Prioritization To Prediction

Prioritization To Prediction

This paper begins with a review of data sources available for building or improving decision models for vulnerability remediation. It then discusses the vulnerability lifecycle and examine timelines and triggers surrounding key milestones. Identifying attributes of vulnerabilities that correlate with exploitation comes next on the docket. The last section measures the outcomes of several remediation strategies and develops a model that optimizes overall effectiveness.

(more available)
Added: October 24, 2018
image from Protected Health Information Data Breach Report

Protected Health Information Data Breach Report

As stated in the report, “The purpose of this study is to shed light on the problem of medical data loss—how it is disclosed, who is causing it and what can be done to combat it.”

(more available)
Added: October 24, 2018
image from Revitalizing Privacy And Trust In A Data-Driven World

Revitalizing Privacy And Trust In A Data-Driven World

From the report, “Massive data breaches and the constant collection of personal information routinely spur debate on whether privacy, rooted in ancient times, is dead in teh digiatl age. Are we in a post-privacy world? In many ways, it is the wrong question. Privacy, security and trust-all increasingly at risk-are also more vital and intertwined in our data-driven society.

(more available)
Added: October 24, 2018
  • ««
  • «
  • 61
  • 62
  • 63
  • 64
  • 65
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)