Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Mobile Maturity Matrix: Where Does Your Business Fall?

Mobile Maturity Matrix: Where Does Your Business Fall?

This report draws key insights from a survey conducted by IDG Connect on behalf of Wandera and VMware to assess the varying levels of mobile maturity within organizations, analyzing key indicators such as risk management, content filtering and data usage management.

(more available)
Added: October 16, 2018
image from Mobile Security Index 2018 Infographic

Mobile Security Index 2018 Infographic

This infographic is based on the report of the same name.

Added: October 16, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018.

(more available)
Added: October 16, 2018
image from Quarterly Threats Report March 2018

Quarterly Threats Report March 2018

In this quarterly report, they discuss the fact that criminals have shifted their tactics and have now moved to power shifting, crypto-currency, and ransomware, as their main focus of cyberthreat.

(more available)
Added: October 16, 2018
image from Risk and Responsibility in a Hyperconnected World

Risk and Responsibility in a Hyperconnected World

From the report, “Risk and Responsibility in a Hyperconnected World, a joint effort between the World Economic Forum and McKinsey & Company, assesses the necessary action areas, and examines the impact of cyberattacks and response readiness. The report sets these against three alternative scenarios in which economic value from technological innovations is realized or lost depending on models of cyber resilience. It draws on knowledge and opinions derived from a series of interviews, workshops and dialogues with global executives and thought leaders to estimate the potential value to be created through 2020 by technological innovations. It examines the value that could be put at risk if the adoption of such innovations is delayed because more frequent, intense cyberattacks are not met with more robust cyber resilience. Finally, the report draws conclusions from the analysis and research, and offers a 14-point roadmap for collaboration.”

(more available)
Added: October 16, 2018
image from Risk Degrees Of Separation

Risk Degrees Of Separation

This BitSight Insights report, Risk Degrees of Separation: The Impact of Fourth Party Networks on Organizations, focuses on aggregate risk and the issue of single points of failure. Insurance companies tackle this risk by monitoring whether a common set of threats impact their entire portfolio of insureds. However, without visibility into cyber risk aggregation, an insurance company could be jeopardized if there is a breach or any type of network disruption that affects a majority of their insureds.

(more available)
Added: October 16, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report November 2016

SecureWorks Threat Intelligence Executive Monthly Report November 2016

This report from November 2016 takes a look at 6 different types of threat events and discusses the insights gleaned from research about those events.

(more available)
Added: October 16, 2018
image from Sleeper Awake: RSA Conference Transcript 2016

Sleeper Awake: RSA Conference Transcript 2016

This is the transcript from Amit Yoran’s presentation at the 2016 RSA Conference.

Added: October 16, 2018
image from State of Software Security Volume 8

State of Software Security Volume 8

In this, the eighth volume of this report, they present metrics that are based on real application risk postures, drawn from code-level analysis of nearly 250 billion lines of code across 400,000 assessmnets performed over a period of 12 months between April 1, 2016 and March 31, 2017.

(more available)
Added: October 16, 2018
image from The Evolution And Revolution Of The CISO

The Evolution And Revolution Of The CISO

This report explores both the incremental and transformational skills required for current and future CISO success, examining which fundamental technology and security capabilities matter most and which unexpected skills CISOs will need to acquire to help organizations reshape security to drive business success.

(more available)
Added: October 16, 2018
image from The Evolving State Of Network Security

The Evolving State Of Network Security

ProtectWise partnered with Osterman Research to interview more than 400 security analysts in the United States in order to uncover the state of network security today across organizations with 1,000 or more employees. The research looked at the biggest security challenges from the inside out, from staffing priorities to the need for specialized roles.

(more available)
Added: October 16, 2018
image from The Executive Cyber Security Playbook

The Executive Cyber Security Playbook

In this ebook, FireEye explains why senior executives must be more proactive about cyber security — before, during and after an event — and how they can help create and maintain a strong security posture.

(more available)
Added: October 16, 2018
image from The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

The Human Point: An Intersection Of Behaviors, Intent, & Critical Business Data

Forcepoint conducted a study of 1,252 cybersecurity professionals worldwide to better understand the state of cybersecurity and how organizations might view a forward-focused strategy, one that moves beyond the current state of chasing infrastructure remediation. The following is an extensive rendering of the data culled, which provides a new perspective on how cybersecurity should be tackled in the future.

(more available)
Added: October 16, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.

Added: October 16, 2018
image from Threat Landscape Report Q2 2017

Threat Landscape Report Q2 2017

This is a quarterly report that looks at the current cubery security threats from each quarter.

Added: October 16, 2018
image from Threat Report 2015

Threat Report 2015

The Proofpoint Threat Report explores threats, trends, and transformations that they see within their customer base and in the wider security marketplace.

(more available)
Added: October 16, 2018
image from Top Threats To Cloud Computing: Deep Dive

Top Threats To Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the top threat’s for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. They encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

(more available)
Added: October 16, 2018
image from UK 2015 Cyber Risk Survey Report

UK 2015 Cyber Risk Survey Report

This is an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. The benchmarking data in this report was collected from risk professionals and CFOs from large and medium-sized corporations from across the UK. It is the hope that the aggregated information will provide useful benchmarking data and reference points against which the reader can compare their own company’s positions.

(more available)
Added: October 16, 2018
image from Voice Of The Analyst: An Inside Perspective On Security Operations

Voice Of The Analyst: An Inside Perspective On Security Operations

This report offers the results of a survey that sought to understand the true nature and quality of a SECOP position.

(more available)
Added: October 16, 2018
image from Written Testimony US House Committee On Energy And Commerce

Written Testimony US House Committee On Energy And Commerce

This is the transcript of testimony given before the US House Committee On Energy And Commerce.

Added: October 16, 2018
image from X-Force Threat Intelligence Report - 2016

X-Force Threat Intelligence Report - 2016

This report discusses information gleaned from the notable highlights in cyber threats during the year 2015. It studies notable incidents and targeted malware affecting geographies including Canada, Australia, the United Kingdom, France, Turkey and Japan. It also discusses the barriers that must be overcome in order to prevent cyber attacks from occurring.

(more available)
Added: October 16, 2018
  • ««
  • «
  • 80
  • 81
  • 82
  • 83
  • 84
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 00:08 UTC (build b1d7be4)