Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Cyber Security in the Boardroom

Cyber Security in the Boardroom

The, NYSE Governance Services, in partnership with Veracode, surveyed nearly 200 directors of public companies representing a variety of industries—including financial services, technology, and health care—to discover how they view cybersecurity in the boardroom. Their goal was to gain insight into how cybersecurity is being understood, prioritized, and addressed at the board level.

(more available)
Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from Cybersecurity For Risk Mitigation In Financial Services

Cybersecurity For Risk Mitigation In Financial Services

From the paper, “The financial industry is no stranger to hacks and data breaches, but recently, the sector has been targeted more aggressively, leaving consumers wondering if their accounts and data are safe. As hackers and attacks become more sophisticated, it is crucial the financial services industry take appropriate actions to safeguard their systems, as well as their customers.”

(more available)
Added: October 17, 2018
image from Cybersecurity Risk Management Oversight

Cybersecurity Risk Management Oversight

This report takes a look at how accountants and other board members analyze cybersecurity.

Added: October 17, 2018
image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.

Added: October 17, 2018
image from Data Breach Industry Forecast

Data Breach Industry Forecast

This paper outlines five predictions for the data breach industry in the coming year.

Added: October 17, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from Exploring Cyber Security Policy Options In Australia

Exploring Cyber Security Policy Options In Australia

In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360o Discovery Exercise in Canberra. The exercise used plausible scenarios to explore the chal- lenges Australia faces in securing cyberspace by placing pres- sure on government authorities, industry capabilities, users’ tolerance for malicious cyber activity, and the ability to develop interdisciplinary solutions to pressing cyber security challenges. The scenarios considered the security of the Internet of Things and intellectual property theft against a backdrop of evolving international norms of behaviour in cyberspace.

(more available)
Added: October 17, 2018
image from External Threats: Security Beyond The Perimeter

External Threats: Security Beyond The Perimeter

The Purpose of this study is to understand companies’ ability to analyze and mitigate online incidents and cyber attacks that are beyond the traditional security perimeter.

(more available)
Added: October 17, 2018
image from GDPR: A Europe Based Regulation With A Global Impact

GDPR: A Europe Based Regulation With A Global Impact

This report takes a look at the GDPR, and what it means for the world.

Added: October 17, 2018
image from Global IT Risks Survey 2015

Global IT Risks Survey 2015

From the report, “It’s time for businesses to recalibrate the way they think about their security budgets. Seen as a separate expense to IT infrastructure, it appears hard to justify until disaster strikes. But understood as an essential part of the IT environment – including mobile devices and virtualized machines – its value is obvious, especially in the context of the damage and huge costs it can prevent.”

(more available)
Added: October 17, 2018
image from Incident Response For Android And iOS

Incident Response For Android And iOS

This book will prepare enterprises and practitioners for the inevitable increase in mobile compromise. We will use step-by-step tutorials, guiding the reader from setting up a mobile IR practice all the way through continuous monitoring of mobile devices.

(more available)
Added: October 17, 2018
image from Internet Of Things Cybersecurity Readiness

Internet Of Things Cybersecurity Readiness

This report provides the results of a unique survey designed to analyze their IoT technologies and the struggles and challenges of providing and preparing for security issues related to thos devices.

(more available)
Added: October 17, 2018
image from Mobile Data Report

Mobile Data Report

This report pays particular attention to the state of mobile security in law firms.

Added: October 17, 2018
image from Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

Partnering for Cyber Resilience Towards the Quantification of Cyber Threats

This report seeks to identify key components toward a framework to cyber risk modeling and qualifying and quantifying known vulnerabilities in defenses, while providing macro-systemic guidance.

(more available)
Added: October 17, 2018
image from Payment Security Report 2015

Payment Security Report 2015

This report concerns itself with the standards and practices related to credit and debit card payment options.

Added: October 17, 2018
image from Rise of the Machines: The Dyn Attack Was Just a Practice Run

Rise of the Machines: The Dyn Attack Was Just a Practice Run

This report uses the impact of the Mirai botnet, to help stakeholders prevent future incidents by addressing the lack of security-by-design in the Internet-of-things and in the Internet itself.

(more available)
Added: October 17, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

Securing IoT Medical Devices: A Guide For Device Manufacturers And Medical Professionals

This guide provides an overview of connected or IoT medical devices, their benefits and risks, real life use cases and best practice security guidelines.

(more available)
Added: October 17, 2018
image from Security Report:The Evolving Role of CISOs

Security Report:The Evolving Role of CISOs

This report presents the consolodiated global findings to better understand the nature of the CISO role and reveal insights, challenges, and approaches to security strategy in today’s global threat landscape.

(more available)
Added: October 17, 2018
image from State Of Cloud Security 2018

State Of Cloud Security 2018

This paper provides insights into some of the latest cloud practices and technologies enterprise information security practitioners must be aware of as IT and sensitive data extends beyond the traditional corporate perimeter.

(more available)
Added: October 17, 2018
  • ««
  • «
  • 77
  • 78
  • 79
  • 80
  • 81
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)