Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from 5th Annual State of Application Security Report, Healthcare Edition (January 2016)

5th Annual State of Application Security Report, Healthcare Edition (January 2016)

This report deals with mobile healthcare apps and their ability to be easily hacked.

Added: October 20, 2018
image from A Primer On File-Borne Malware Threats

A Primer On File-Borne Malware Threats

This paper will examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.

(more available)
Added: October 20, 2018
image from Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach

Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach

GAO was asked to report on the major breach that occurred at Equifax in 2017. This report (1) summarizes the events regarding the breach and the steps taken by Equifax to assess, respond to, and recover from the incident and (2) describes actions by federal agencies to respond to the breach.

(more available)
Added: October 20, 2018
image from Advancing To Bot Management And Security

Advancing To Bot Management And Security

This report discusses the use of Bots in managing security risks for an organization. It specifically discusses the issures related to credential stuffing.

(more available)
Added: October 20, 2018
image from An Integrated Vision To Manage Cyber Risk

An Integrated Vision To Manage Cyber Risk

This report lays out a new strategy for addressing cybersecurity issues.

Added: October 20, 2018
image from AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

AndroRATIntern: A Japanese Mobile Threat With Global Implications For Mobile Data Security

This report provides an exclusive look at a very particular Trojan that has appeared out of Japan.

Added: October 20, 2018
image from APT28: Center Of The Storm

APT28: Center Of The Storm

This report details observations of APT28’s, a Russian Sponsored cyber network, targeting, and an investigation into a related breach. They also provide an update on shifts in the group’s tool development and use, and summarize the tactics APT28 employs to compromise its victims.

(more available)
Added: October 20, 2018
image from Beneath the surface of a cyberattack

Beneath the surface of a cyberattack

In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, Deloitte has leveraged their experience with a variety of cyber incidents and their deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack.

(more available)
Added: October 20, 2018
image from Blockchain Threat Report

Blockchain Threat Report

This report discusses the security concerns that have arisen about the new technology, blockchain.

Added: October 20, 2018
image from Bridging The Gap Between Secops Intent And Reality

Bridging The Gap Between Secops Intent And Reality

This report is based on a survey conducted from a variety of groups with regards to Secops and why are there is a gap between what it intends to do and the reality of what it is.

(more available)
Added: October 20, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.

Added: October 20, 2018
image from Concept Paper on a proposed categorisation methodology for cyber risk

Concept Paper on a proposed categorisation methodology for cyber risk

The CRO Forum looked into the issues around cyber resilience in the paper it published in 2014. In this paper, cyber risk was defined as the risk of doing business in the cyber environment. This paper builds on the 2014 paper to focus on how to address the challenges around the collection of data to support improved cyber resilience.

(more available)
Added: October 20, 2018
image from Coporate IT Security Risks Special Report Series 2016

Coporate IT Security Risks Special Report Series 2016

In order to find out more about the challenges and threats businesses are encountering, Kaspersky Lab, together with B2B International, has conducted a study entitled Corporate IT Security Risks Survey 2016. We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyber threats.

(more available)
Added: October 20, 2018
image from Data Risk in the Third-Party Ecosystem

Data Risk in the Third-Party Ecosystem

This paper was written to understand understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.

(more available)
Added: October 20, 2018
image from DDoS Threat Report Q3 2016

DDoS Threat Report Q3 2016

This report takes a look at the DDoS threats that occurred in the third quarter of 2016.

Added: October 20, 2018
image from Detection Survey Infographic

Detection Survey Infographic

This infographic offers a summary of survey points that sought to answer what is causing the spike in detection investment.

(more available)
Added: October 20, 2018
image from ENISA Threat Landscape Report 2017

ENISA Threat Landscape Report 2017

This report summarizes the threat landscape seen in 2017 and gives some clear recommendations for the future.

Added: October 20, 2018
image from Exposé Of A Credit Card Black Market

Exposé Of A Credit Card Black Market

This short report takes a look at cybersecurity related Credit Card Fraud.

Added: October 20, 2018
image from Exposing The Enemy Within

Exposing The Enemy Within

This e-Book takes a look at what your DNS can tell you about your security Posture.

Added: October 20, 2018
image from Fail To Plan, Plan To Fail

Fail To Plan, Plan To Fail

This paper is the result of a Forrester survey that sought to understand the roles of LoB practitioners and SOCs in securing IoT environments.

(more available)
Added: October 20, 2018
image from Fighting File Based Exploits Across The Expanding Attack Surface

Fighting File Based Exploits Across The Expanding Attack Surface

This report provides insight into taking a proactive approachv against known, unkown, and zero-day exploits that serve as the starting point for multi-vector cyberattacks.

(more available)
Added: October 20, 2018
  • ««
  • «
  • 70
  • 71
  • 72
  • 73
  • 74
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)