Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Sensitive Data At Risk:The SANS 2017 Data Protection Survey

Sensitive Data At Risk:The SANS 2017 Data Protection Survey

This report is based on a survey that sought to see how organizations were protecting their data.

Added: October 22, 2018
image from State of the Internet Security 2nd Quarter 2017

State of the Internet Security 2nd Quarter 2017

This is Akamai’s State of The Internet Security report from the second quarter of 2017

Added: October 22, 2018
image from The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

IBM Resilient and Ponemon Institute are pleased to release the findings of the study on the importance of cyber resilience for a strong security posture. We surveyed more than 413 IT and IT security professionals in the UK1, Only 25 percent of respondents say their organisation has a high level of cyber resilience. According to the findings, 71 percent of respondents believe their organisation is not prepared to recover from cyber attacks.

(more available)
Added: October 22, 2018
image from The Five Steps To Managing Third Party Risk

The Five Steps To Managing Third Party Risk

This white paper tackles the subject of how outsourced labor can cause cybersecurity risk.

Added: October 22, 2018
image from The Four Types Of Threat Detection

The Four Types Of Threat Detection

There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.

(more available)
Added: October 22, 2018
image from The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

The Nervous, The Vigilant, And The Battle-Scarred: IT Security Personas Revealed

This book offers some insight into email cybersecurity issues. It posits that email doesn’t have to be scary.

Added: October 22, 2018
image from The Security Provisions OF GDPR

The Security Provisions OF GDPR

The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice.

(more available)
Added: October 22, 2018
image from The State Of Industrial Cybersecurity 2018

The State Of Industrial Cybersecurity 2018

The present trend study “The State of Industrial Cybersecurity 2018” seeks to answer the questions, what do use companies really want? What Are their priorities, and what concerns and challenges do they face? What external and internal factors are impacting industrial cybersecurity? What strategies and measures are being employed, now and in the future?

(more available)
Added: October 22, 2018
image from The Surge Of Cyber Threats: What Higher Education Needs To Know

The Surge Of Cyber Threats: What Higher Education Needs To Know

This report takes a specific look at cyber threats on the campuses of higher learning facilities.

Added: October 22, 2018
image from Threat Actor - APT28

Threat Actor - APT28

This report takes a look at ATP28 a recognized state sponsored threat actor operating out of Russia.

Added: October 22, 2018
image from Threat Monitoring Detection Response Report 2017

Threat Monitoring Detection Response Report 2017

This study is a summary of responses from over 400 cybersecurity professionals to provide a comprehensive snapshot on the evolving threat landscape, insider and external threats, preventative measures, threat monitoring and data collection, threat intelligence, threat detection, threat hunting, threat analytics, incident response, and incident recovery.

(more available)
Added: October 22, 2018
image from Unlocking B2B SaaS Growth With Identity Management

Unlocking B2B SaaS Growth With Identity Management

SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue.

(more available)
Added: October 22, 2018
image from Virtualization's Hidden Traps

Virtualization's Hidden Traps

This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany.

(more available)
Added: October 22, 2018
image from Whitepaper: Legislation And The Impact On Data Privacy

Whitepaper: Legislation And The Impact On Data Privacy

From the paper, “In March 2017, the expectation of privacy while surfing the internet disappeared in the United States. Congress voted to eliminate the broadband privacy rules that required internet service providers (ISPs) to get explicit consent from consumers before selling or sharing web browsing data and other private information to third parties. With no rules in place to protect personal or corporate web browsing data, there are a few proactive steps to take to help safeguard this information.”

(more available)
Added: October 22, 2018
image from 2015 Cost of Data Breach Study: Global Analysis

2015 Cost of Data Breach Study: Global Analysis

In this report, they examine two factors that affected the financial consequences of a data breach. The first is executive involvement in their organization’s IT security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach.

(more available)
Added: October 21, 2018
image from 2017 Cloud Security Report

2017 Cloud Security Report

This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others.

(more available)
Added: October 21, 2018
image from 2017 Internet Security Threat Report, Volume 22

2017 Internet Security Threat Report, Volume 22

Symantec has established the largest civilian threat collection network in the world, and through that has developed the Symantec Global Intelligence Network. Through that development comes this report based on their experiences in 2016.

(more available)
Added: October 21, 2018
image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 2018 Cyber Threat Intelligence Estimate

2018 Cyber Threat Intelligence Estimate

This report is based on security digital footprint assessments conducted in 2017. It offers predictions for 2018 and analysis of 2017.

(more available)
Added: October 21, 2018
image from 2018 CyberThreat Defense Report

2018 CyberThreat Defense Report

This report advertises itself as a “vendor-agnostic” report. Now in its fifth year, this report has become a staple among IT security leaders and practitioners. They stick to the usual suspects in cyber threats, but also outline some new areas related to Cloud investment, app containers, reliance on mobile devices, and the continuing damage of ransomware.

(more available)
Added: October 21, 2018
image from 6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

6 Best Practices For Law Firms To Protect Sensitive Data In The Cloud

This white paper presents the key best practices for law firms of all sizes that want to to enable cloud-based file sharing while protecting sensitive data.

(more available)
Added: October 21, 2018
  • ««
  • «
  • 67
  • 68
  • 69
  • 70
  • 71
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)