Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Internet Trends 2016 Code Conference

Internet Trends 2016 Code Conference

This is Mary Meeker’s annual report on Internet Trends.

Added: October 19, 2018
image from McAfee Labs Threat Report December 2017

McAfee Labs Threat Report December 2017

In this report, they highlight the statistics gathered by McAfee Labs in Q3 of 2017.

Added: October 19, 2018
image from Mobile Leak Report 2017

Mobile Leak Report 2017

This report calls itself “The Panama Papers” of mobile leak reporting.

Added: October 19, 2018
image from Network Detection: What Is It Really?

Network Detection: What Is It Really?

This report seeks to help provide important information to clarify what cybersecurity organizations are truly offering.

Added: October 19, 2018
image from Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

Ok Panic: Newly Evolved Ransomware Is Bad News For Everyone

A quick and effecient article discussing why the new ransomware is dangerous.

Added: October 19, 2018
image from Open Banking Security Considerations And Potential Risks

Open Banking Security Considerations And Potential Risks

This report takes a good look at Open Banking, it defines what it is, and considers the security implications for using it.

(more available)
Added: October 19, 2018
image from Overcoming GDPR Compliance Challenges

Overcoming GDPR Compliance Challenges

This report introduces GDPR and the challenges that are involved and then discusses measures that organisations can take in order to boost their data protection capabilities. It also looks at the pitfalls to avoid as they can derail the overall programme. It is intended for those organisations that are working down the path to compliance and that are looking for guidance in how compliance can be achieved.

(more available)
Added: October 19, 2018
image from Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Personal Data Protection:Brief Handbook On The Proper Application Of GDPR

Ever since the new European regulation on the protection of personal data (GDPR) was voted in, businesses have started their countdown to the transition that will take place in May 2018. They now have less than 2 years to comply with the new European regulation and the consequences of its new requirements in terms of data protection: strengthened cybersecurity, liability of data collection entities and new mandatory procedures. For organizations, what this entails now is the need to review their procedures and ensure their regulatory compliance before it starts raining sanctions.This white paper aims to address the question by providing a simplified interpretation of the regulation and practical solutions for a smooth transition.

(more available)
Added: October 19, 2018
image from Post-Soviet Bank Heists

Post-Soviet Bank Heists

This report takes a look at recent bank heists that originated from Post-Soviet states.

Added: October 19, 2018
image from Preparing For NGAV At Scale

Preparing For NGAV At Scale

This Paper is subtitled “Stopping Attacks In Progress Starts With Asking The Right Questions” The paper tries to discuss and reveal the questions that should be asked.

(more available)
Added: October 19, 2018
image from Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

Securing Our Future: Closing the Cybersecurity Talent Gap (October 2015)

October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness.

Added: October 19, 2018
image from The CISO's Dilemma: Security Versus Productivity

The CISO's Dilemma: Security Versus Productivity

This study looks at what today’s organizations are doing to prevent endpoint breaches targeting employees, the success of those efforts, and the associated costs that make this whole approach rather frustrating.

(more available)
Added: October 19, 2018
image from The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

The Cyber Resilient Organization in Germany: Learning to Thrive against Threats

Are businesses ready today to face cyber threats head on? To find out, Ponemon Institute, with sponsorship from Resilient, an IBM Company, surveyed organizations in Germany about their approach to becoming resilient to security threats. The findings are presented in this study.

(more available)
Added: October 19, 2018
image from The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018

As we approach critical mass of hacker-powered security, read on to learn more about best practices of starting and running effective disclosure and bug bounty programs, and get to know some of the stories and stats about the hackers themselves.

(more available)
Added: October 19, 2018
image from The True Cost Of Compliance With Data Protection Regulations

The True Cost Of Compliance With Data Protection Regulations

Ponemon Institute and Globalscape conducted The True Cost of Compliance with Data Protection Regulations to determine the full economic impact of compliance activities for a representative sample of 53 multinational organizations. An earlier study was completed in 2011 and those findings are compared to this year’s results.

(more available)
Added: October 19, 2018
image from The Weaponization Of Information: The Need For Cognitive Security

The Weaponization Of Information: The Need For Cognitive Security

This paper presents the Testimony of Rand Waltzman presented before the Senate Armed Services Committee, Subcommittee on Cybersecurity on April 27, 2017.

(more available)
Added: October 19, 2018
image from Threat Landscape Report Q4 2017

Threat Landscape Report Q4 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 19, 2018
image from Top Insider Threat Concerns: Careless Users

Top Insider Threat Concerns: Careless Users

This article discusses three different types of careless users who cause cybersecurity incidents.

Added: October 19, 2018
image from Transformational ‘smart cities’: cyber security and resilience

Transformational ‘smart cities’: cyber security and resilience

This report will explore the requirements and challenges of creating a secure, reliable and resilient smart city. It will consider how administrations and the overall city ecosystems will need to provide innovative, resilient ‘smart’ solutions that leverage digital information while protecting against malicious violations, unintentional damage and natural disasters.

(more available)
Added: October 19, 2018
image from Trends for 2015: Targeting the Corporate World

Trends for 2015: Targeting the Corporate World

The “Trends For 2015 – Targeting the Corporate World” report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to consider and present the challenges and threats expected for 2015. This report will try to address the different types of threats and security incidents we have witnessed during the year classified by catego- ry in order to answer the following questions: what will we find during 2015 in terms of IT security? And how, therefore, can companies and individual users prepare themselves to get through next year in safe- ty?

(more available)
Added: October 19, 2018
image from US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

US Cities Exposed: A Shodan-based Security Study On Exposed Assets In Cities In The US

This paper takes a look at the cities of the US, and the cyber threats that occurred there.

Added: October 19, 2018
  • ««
  • «
  • 73
  • 74
  • 75
  • 76
  • 77
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 04:08 UTC (build b1d7be4)