Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from A Framework For Exploring Cybersecurity Policy Options

A Framework For Exploring Cybersecurity Policy Options

The goal of this project was to develop an initial framework for cybersecurity that considers the roles of government, industry, advo- cacy organizations, and academic institutions and how these stake- holders’ concerns relate to each other.

(more available)
Added: October 23, 2018
image from Achieving Cyber Resilience

Achieving Cyber Resilience

This paper lays out the appropriate steps companies should take to protect their business from cyber attacks and ransomware.

Added: October 23, 2018
image from Anatomy Of A Cyber Extortion Operation

Anatomy Of A Cyber Extortion Operation

In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations.

(more available)
Added: October 23, 2018
image from Annual Ransomware Report 2017

Annual Ransomware Report 2017

Druva conducted its annual ransomware survey to better understand what impact ransomware has had on organizations, how they have responded to breaches, and what their outlook is regarding the future of these types of malware attacks.

(more available)
Added: October 23, 2018
image from BDO 2017 Cyber Governance Survey

BDO 2017 Cyber Governance Survey

This survey was created to act as a barometer to measure the involvement of public company directors in cyber-risk management.

(more available)
Added: October 23, 2018
image from Beyond the Bottom Line: The Real Cost of Data Breaches

Beyond the Bottom Line: The Real Cost of Data Breaches

This report is based on the results of an independent survey conducted by market research specialist Vanson Bourne.

Added: October 23, 2018
image from Breaking Down The Complexity Of Retail Security

Breaking Down The Complexity Of Retail Security

This report takes a look at retail security. It discusses the challenges, and options available to help solve some of the problems involved in defending retail markets.

(more available)
Added: October 23, 2018
image from Consumer Account Security Report 2016

Consumer Account Security Report 2016

The report describes consumers’ account security practices, their exposure to security incidents and their expectations for companies to protect their mobile and online accounts. Data are drawn from an online survey of 1,300 adults conducted in September 2016.

(more available)
Added: October 23, 2018
image from Cyber Threatscape Report 2018

Cyber Threatscape Report 2018

This report provides detailed information about Iranian Threat, Extended Supply Chain Threats, Critical Infrastructure, Advanced Persistent Threats, Miner Malware, and Ransomware.

(more available)
Added: October 23, 2018
image from Cybersecurity Preparedness and Response

Cybersecurity Preparedness and Response

This is a report based on a collaborative survey. Taken as a whole, there continues to be low hanging vulnerabilities which are not addressed in the middle market space. This survey is meant to highlight some of these vulnerabilities and provide risk professionals with a tool to help mitigate both privacy and security risk.

(more available)
Added: October 23, 2018
image from Enterprise Mobile: The New Threat Vector

Enterprise Mobile: The New Threat Vector

This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age.

Added: October 23, 2018
image from Examining The Costs and Causes of Cyber Incidents

Examining The Costs and Causes of Cyber Incidents

Researchers built a number of scanning devices using Raspberry Pi minicomputers and, by taking them out to athletic events and busy public spaces, found that tracking of individuals was possible.

(more available)
Added: October 23, 2018
image from GDPR Advisory #1: Protecting The Pathways To Personal Information

GDPR Advisory #1: Protecting The Pathways To Personal Information

The series will show you how to take practical steps to aid your organization in meeting GDPR requirements for protecting personal data.

(more available)
Added: October 23, 2018
image from GTIC Monthly Threat Report September 2017

GTIC Monthly Threat Report September 2017

This monthly threat report takes a look at the month of September 2017. More specifically, it takes a look at VULNS, Apache Exploits, and the Equifax breach.

(more available)
Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
image from Is Data The New Endpoint

Is Data The New Endpoint

This IDC perspective proposes that corporations should reconsider how they think about data in order to improve how it can be secured.

(more available)
Added: October 23, 2018
image from Key Findings from The Global State of Information Security Survey 2017

Key Findings from The Global State of Information Security Survey 2017

This initial paper explores how digital organizations are leveraging new technology safeguards to build a cybersecurity and privacy program that jumpstarts success—and creates a truly differentiating business capability.

(more available)
Added: October 23, 2018
image from Next-Gen Endpoint Risks And Protections: A SANS Survey

Next-Gen Endpoint Risks And Protections: A SANS Survey

This newly released SANS survey suggests the need to broaden the definition of endpoint to include the user. The two most common forms of attacks reported are browser-based attacks and social engineering, both of which are directed at users, not technology. Download this survey report to learn other key issues surrounding endpoint protection.

(more available)
Added: October 23, 2018
image from PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

PCI Compliance Best Practice: How To Redact Credit Card Information From Documents And Emails

While a data loss incident can be a disaster for an organization’s reputation, there is now a new imperative around inbound information as well. Unwanted data acquisition can create problems just as much as data leaving the organization. There are a couple of scenarios which should be considered. Read this paper to know more.

(more available)
Added: October 23, 2018
image from Prepare For Battle:Building An Incident Response Plan

Prepare For Battle:Building An Incident Response Plan

This report provides a walkthrough of creating an Incident Response Plan.

Added: October 23, 2018
image from Quarterly Report Q4 2017

Quarterly Report Q4 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 23, 2018
  • ««
  • «
  • 63
  • 64
  • 65
  • 66
  • 67
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)