Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Quarterly Report Q2 2017

Quarterly Report Q2 2017

This is a Quarterly Report that looks at Cyber security issues in New Zealand and around the world.

Added: October 21, 2018
image from SERT Quarterly Threat Report 2015

SERT Quarterly Threat Report 2015

“The SERT Quarterly Threat Report provides a glimpse inside the research conducted by Solutionary researchers, security professionals and analysts spanning the last three months and highlights the results of this research. In addition to a wide variety of open-source intelligence tools and honeypots, SERT also analyzes data from the Solutionary ActiveGuard platform. The patented, cloud-based Solutionary ActiveGuard service platform collects, correlates and analyzes security events across systems for Solutionary clients globally, providing researchers with an even deeper understanding of the overall threat landscape.”

(more available)
Added: October 21, 2018
image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from Tech Report:Targeted Attacks On Defense Industry

Tech Report:Targeted Attacks On Defense Industry

This report, based on case studies, outlines the recent trends of cyberattacks on the defense industry.

Added: October 21, 2018
image from The Darknet Index: 2018 Black Hat Edition

The Darknet Index: 2018 Black Hat Edition

Notable declines in darknet exposure among black hat exhibitors, but does a risky darkint score correlate to share price performance?

(more available)
Added: October 21, 2018
image from The Life And Times Of Cybersecurity Professionals

The Life And Times Of Cybersecurity Professionals

This paper examines the life of those in the cybersecurity profession, and seeks to provide answers to the high turnover rate in the field.

(more available)
Added: October 21, 2018
image from The Rising Strategic Risks of Cyberattacks

The Rising Strategic Risks of Cyberattacks

Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation.

(more available)
Added: October 21, 2018
image from The Value Of Data

The Value Of Data

This paper was conceived to examine the relative value placed on data from the perspective of different stakeholders: be they enterprise security professionals, regulators, insurers or cybercriminals. An integral part of this process is determining what that data is worth. The report attempts to answer this question and to provide guidance that can be used to help evaluate the cost of data breaches. It also looks at what data risk vigilance measures organizations have in place.

(more available)
Added: October 21, 2018
image from Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

Threat Advisory: Thomas Cook (India) Ltd. Mobile Apps And Website

This is a threat advisory for Thomas Cook Ltd. Mobile Apps & Website

Added: October 21, 2018
image from US Senate Subcomittee On Data Security And Bug Bounties

US Senate Subcomittee On Data Security And Bug Bounties

This is a transcript of a February 2018 US Senate meeting that discussed Data Security and the hacking community.

Added: October 21, 2018
image from US-Japan Alliance Conference: Strengthening Strategic Cooperation

US-Japan Alliance Conference: Strengthening Strategic Cooperation

In 2015, after two years of study and policy coordination, the United States and Japan publicly issued new defense guidelines, updating and expanding upon the previous guidance of 1997. The new guidelines enable a much broader set of cooperative engagements, including in geographic areas beyond the areas surrounding Japan and in the new domains of outer space and cyberspace.

(more available)
Added: October 21, 2018
image from Verisign Distributed Denial of Service Trends Report

Verisign Distributed Denial of Service Trends Report

This report contains the observations and insights1 derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in Q4 2015. It represents a unique view into the attack trends unfolding online for the previous quarter, including attack statistics and behavioral trends.

(more available)
Added: October 21, 2018
image from Virtualization Makes CIOs Role Key

Virtualization Makes CIOs Role Key

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming?

(more available)
Added: October 21, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from 2015 Cyber Security Survey: Major Australian Businesses

2015 Cyber Security Survey: Major Australian Businesses

A report that was created by the 2015 Australian Cyber Security Centre (ACSC) Cyber Security Survey of major Australian businesses was conducted to obtain a better picture of Australian organisations’ understanding of cyber threats and how they are positioned to secure their networks.

(more available)
Added: October 20, 2018
image from 2016 Cost of Cyber Crime Study & the Risk of Business Innovation

2016 Cost of Cyber Crime Study & the Risk of Business Innovation

From the report, “Cyber attacks are a reality for all organizations. In this year’s cost of cyber crime research they focus on the importance of thriving and innovating while simultaneously reducing the financial and reputational consequences of a cyber attack. An important finding of this research is that a high security profile, as determined by the deployment of specific practices and technologies, will support business innovation and reduce the cost of cyber crime.”

(more available)
Added: October 20, 2018
image from 2016 Global Encryption Trends Study

2016 Global Encryption Trends Study

The purpose of this research is to examine how the use of encryption has evolved over the past 11 years and the impact of this technology on the security posture of organizations. The first encryption trends study was conducted in 2005 for a US sample of respondents.3 Since then we have expanded the scope of the research to include respondents in all regions of the world.

(more available)
Added: October 20, 2018
image from 2017 Cyberthreat Defense Report

2017 Cyberthreat Defense Report

This report hopes to help IT security decision makers gain a better understanding of how their perceptions, concerns, priorities, and defenses stack up against those of other IT security professionals and their organizations. Applied constructively, the data, analyses, and findings covered here can be used by diligent IT security teams to shape answers to many important questions.

(more available)
Added: October 20, 2018
image from 2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

2017 Ransomware Defense Survey Report: The Enterprise Strikes Back

This report provides complete survey reports, expert analysis, and thoughts from leading experts in the field.

Added: October 20, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
image from 360 Degrees Cyber Risk Survey

360 Degrees Cyber Risk Survey

The 360° Cyber Risk Survey Report provides rich benchmarked data, informed analysis, and actionable best practices to help middle-market organizations, senior leaders, and boards of directors obtain a better understanding of the operational and financial impacts of cyber risks. In today’s ever-changing cyber threat landscape, knowing how your organization stacks up against others is key in the fight to stay ahead of the next threat.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 69
  • 70
  • 71
  • 72
  • 73
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)