Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from How Collaboration Can Optimize Security Operations

How Collaboration Can Optimize Security Operations

The executive summary of this report says, “The secret to advanced threat preparedness may actually lie within your organization — your current people, processes and technologies…Enterprises are coming to the realist that a fragmented or compartmentalized security operations design is ineffective against today’s advanced security threats.”

(more available)
Added: October 22, 2018
image from How much does Cyber/Data Breach Insurance Cost?

How much does Cyber/Data Breach Insurance Cost?

A sampling of clients’ actual cyber/data breach insurance policy annual premiums.

Added: October 22, 2018
image from Incident Response Reference Guide

Incident Response Reference Guide

This Guide aims to help businesses have a good response to cyber threat incidents.

Added: October 22, 2018
image from Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and beyond: Reaping the dividends of cyber resilience is the latest viewpoint in PwC’s Insurance 2020 and beyond series, which explores the megatrends that are reshaping the competitive environment for insurers, reinsurers, brokers and the markets in which they operate.

(more available)
Added: October 22, 2018
image from Internet of Things Security Considerations In A MultiCloud Environment

Internet of Things Security Considerations In A MultiCloud Environment

Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration.

(more available)
Added: October 22, 2018
image from ISTR Email Threats 2017

ISTR Email Threats 2017

This special report analyzes Email and the threats that occur in that environment.

Added: October 22, 2018
image from Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey

This is a brief playbook that gives a plan for how to get started with cloud security.

Added: October 22, 2018
image from Know Your Data To Create Actionable Policy

Know Your Data To Create Actionable Policy

Too often, security and risk (S&R) leaders create data policies without a clear understanding of feasibility and purpose within their business because they themselves are in the dark about their data — from what data they have to where it resides. As a result, many policies are ineffective and can even hinder business processes. In today’s evolving data economy, data identity is the missing link that S&R leaders must define to create actionable policy. This report was designed to help S&R leaders develop effective policies using their Data Security And Control Framework as a guideline.

(more available)
Added: October 22, 2018
image from Law Enforcement Cyber Center: Final Technical Report

Law Enforcement Cyber Center: Final Technical Report

The research reported here was conducted in the RAND Justice Policy Program, which spans both criminal and civil justice system issues with such topics as public safety, effective policing, police–community relations, drug policy and enforcement, corrections policy, use of technology in law enforcement, tort reform, catastrophe and mass-injury compensation, court resourcing, and insurance regulation. Program research is supported by government agencies, foundations, and the private sector.

(more available)
Added: October 22, 2018
image from Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

This report offers insight into the cyber events of 2015 and makes predictions for 2016 - 2019.

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
image from NFP Governance And Performance Study

NFP Governance And Performance Study

This report analyzes non-profit organizations in Australia and in particular, sought to understand how important cybersecurity issues were to those organizations.

(more available)
Added: October 22, 2018
image from NIST Special Publication 800-171 for higher educatino

NIST Special Publication 800-171 for higher educatino

This is a guide that is especially designed to help colleges and universities comply with new federal regulations.

Added: October 22, 2018
image from Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

From the Report, “A common refrain from community banks and credit unions is that since they are not experiencing a fraud attack at the moment, they don’t see any need to invest in fraud protection. Now apply the same logic elsewhere – it follows then, that purchasing home insurance doesn’t make sense, as my house isn’t currently on fire. This kind of reasoning is short-sighted and leaves banks and their customers vulnerable to fraud–related financial losses. It also ignores a growing, if unfortunate, precedent – that losses from cyberattacks number in the billions of dollars annually (one report put it as high as $445 billion), and it continues to rise every year.”

(more available)
Added: October 22, 2018
image from Practitioner’s Guide to Building a Security Operations Center (SOC)

Practitioner’s Guide to Building a Security Operations Center (SOC)

This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform.

(more available)
Added: October 22, 2018
image from Privileged Access Security For Dummies

Privileged Access Security For Dummies

This is a handy and simple guide for helping individuals understand and implement Privileged Access Security.

Added: October 22, 2018
image from Quarterly Report Q3 2017

Quarterly Report Q3 2017

This is a quarterly report that looks at cyber security issues in New Zealand and around the world.

Added: October 22, 2018
image from Recorded Future for SOC Teams Lab Test

Recorded Future for SOC Teams Lab Test

Details research regarding the company Recorded Future. Shows how this company aided in the effeciency of dealing with cyber attacks and threats.

(more available)
Added: October 22, 2018
image from Regional Advanced Threat Report: Asia Pacific H1 2015

Regional Advanced Threat Report: Asia Pacific H1 2015

This report discusses trends in the cyber security environment in Asia Pacific from January to June 2015.

Added: October 22, 2018
image from Reporting to the Board: Where CISOs and the Board are Missing the Mark

Reporting to the Board: Where CISOs and the Board are Missing the Mark

This report details how IT reports are not effectively communicating the dangers of cyber threats so that the boards of organizations can make good decisions.

(more available)
Added: October 22, 2018
image from Securing A Digital Retail Enterprise

Securing A Digital Retail Enterprise

This whitepaper explores the necessary steps for securing a retail enterprise in a digital world.

Added: October 22, 2018
  • ««
  • «
  • 66
  • 67
  • 68
  • 69
  • 70
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)