Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from The State of Malware Detection & Prevention

The State of Malware Detection & Prevention

From the report, “We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks.”

(more available)
Added: October 15, 2018
image from Threat Intelligence Executive Reprot 2017: Volume 6

Threat Intelligence Executive Reprot 2017: Volume 6

This Threat Report takes a look at some of the events of late 2017. Specifically, it looks at self-propagating malware, a specific Microsoft Office vuln, and multiple espionage campaigns that target energy utility companies.

(more available)
Added: October 15, 2018
image from Threat Landscape Report Q1 2018

Threat Landscape Report Q1 2018

This report continues Fortinet’s excellent threat report. It discusses operational technology, Zero-day markets, malware, cryptojacking, the hacking event at the winter olympics, the rise of botnets, and Adromeda. Read On!

(more available)
Added: October 15, 2018
image from Threat Report

Threat Report

Advice in this report ranges from the tactical to the strategic. Recognize the importance of solutions that can provide specific benefits yet work as part of a unified security posture. They claim that their security recommendations will provide actionable information and guidance, while taking into account the need for organizations to grow and innovate at the same time.

(more available)
Added: October 15, 2018
image from Trusted Access Report 2016

Trusted Access Report 2016

This paper takes a look at the current state of device security.

Added: October 15, 2018
image from White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

White Hat, Black Hat, And The Emergence Of Gray Hat: The True Costs Of Cybercrime

According to this report, the attractions and profitability of the digital underworld are leading some security practitioners to become ‘gray hats’ and get involved in cybercrime.

(more available)
Added: October 15, 2018
image from Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Why K-12 Cybersecurity Involves More Than Just CIPA Compliance

Cybersecurity is one of many considerations teachers now juggle as they seek to get the most out of digital transformation in the classroom. But when the weight of assuring cybersecurity conflicts with the litany of everyday issues that teachers are faced with on campus, enforcing digital best practices often falls by the wayside.

(more available)
Added: October 15, 2018
image from X-Force Threat Intelligence Index 2018

X-Force Threat Intelligence Index 2018

In this report, IBM culled the data collected between 01 January 2017 and 31 December 2017, to deliver insightful information about the global threat landscape and apprise security professionals about the threats most relevant to their organizations.

(more available)
Added: October 15, 2018
image from 2015 Internet Crime Report

2015 Internet Crime Report

The 2015 Internet Crime Report highlights the IC3’s efforts over the past year, specifically focusing on their efforts regarding Business Email Compromise (BEC) and Email Account Compromise (EAC) scams and the Operation Wellspring Initiative (OWS).

(more available)
Added: October 14, 2018
image from 2016 Midmarket Threat Summary Report

2016 Midmarket Threat Summary Report

This report provides an analysis of threats in 2016, and the necessary steps to protect your business from those threats.

(more available)
Added: October 14, 2018
image from 2016 State Of Privacy & Security Awareness: The Story Behind The Story

2016 State Of Privacy & Security Awareness: The Story Behind The Story

From the report, “Good privacy and security practices are often common sense—but ensuring that this common sense is applied consistently and rigorously makes all the difference in the world. In a truly risk-aware organization, employees combine policy know-how, common sense, and a keen eye for detail as they regularly align their actions with your organizations security and privacy principles. How will you ensure that you’ve got such a culture?”

(more available)
Added: October 14, 2018
image from 2016 State of the Endpoint Report

2016 State of the Endpoint Report

This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. They surveyed 694 US IT and IT security practitioners who are involved in endpoint security in a variety of organizations.

(more available)
Added: October 14, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from 2017 Fintech Security Analysis Report

2017 Fintech Security Analysis Report

This very thorough report is based on a survey that sought to understand the security status of China’s Fintech Enterprises.

(more available)
Added: October 14, 2018
image from 2017 IT Security Privacy Survey

2017 IT Security Privacy Survey

When tackling cyber risk, board involvement and effective communication continue to drive performance. Learn more in this report on the key findings from Protiviti’s 2017 Security and Privacy Survey.

(more available)
Added: October 14, 2018
image from 2017 Phishing Response Trends Singapore Region

2017 Phishing Response Trends Singapore Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 14, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from Advanced Precision Threat (APT) Protection: Market Quadrant 2018

Advanced Precision Threat (APT) Protection: Market Quadrant 2018

This report discusses APT Protection and how it impacts a certain quadrant of the Market.

Added: October 14, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from Annual Security Roundup: The Paradox Of Cyberthreats

Annual Security Roundup: The Paradox Of Cyberthreats

This report reviews the significant cyber events of 2017, and discusses the paradox that occurred.

Added: October 14, 2018
image from Best Practices For Web Application Firewall Management

Best Practices For Web Application Firewall Management

The experts at TrustWave have prepared this report to outline the issues and practices for web application firewall management.

Added: October 14, 2018
  • ««
  • «
  • 83
  • 84
  • 85
  • 86
  • 87
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 16:08 UTC (build b1d7be4)