Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from BREACH REPORT 2015: Protected Health Information

BREACH REPORT 2015: Protected Health Information

This is Redspin’s 6th annual Breach Report: Protected Health Information (PHI). At the conclusion of each year, they analyze the complete statistical data set of large breaches that have been reported to HHS. In the report, they assess the overall effectiveness of the current policies and controls designed to safeguard PHI. In 2105, they identify significant trends and draw attention to the specific areas most in need of improvement. They then offer Redspin’s recommendations for preventive measures and corrective actions to address any critical gaps or weaknesses. Their goal is to help the healthcare industry continually improve its ability to protect patient information.

(more available)
Added: October 14, 2018
image from Cloud Security Report 2017

Cloud Security Report 2017

This report includes research on the evolving state of cloud security.

Added: October 14, 2018
image from Cyber Security Breaches Survey

Cyber Security Breaches Survey

From the UK, this report was commissioned by the Department for Culture, Media and Sport (DCMS) and it details the findings from a quantitative and qualitative survey with UK businesses on cyber security.

(more available)
Added: October 14, 2018
image from Cyber Vulnerability: Where do you Stand

Cyber Vulnerability: Where do you Stand

This report focusses on the analysis of the cyber security posture of three industries: Finance and Insurance, Healthcare and Social Assistance, and Public Administration. The study looks into the number of event types by year from 2012 to 2016, the security ratings for cyber insurance by industry, and many other key data.

(more available)
Added: October 14, 2018
image from Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

Cybersecurity Insights Volume 6: Mind The Gap Cybersecurity's Big Disconnect

This whitepaper discusses the disconnects that have emerged between cybersecurity threats and organizations’ contermeasures.

Added: October 14, 2018
image from Data Breach Digest: IoT Calamity, The Panda Monium

Data Breach Digest: IoT Calamity, The Panda Monium

This is a report based on a one man’s experience with IoT security.

Added: October 14, 2018
image from Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

Data Thieves: The Motivations Of Cyber Threat Actors And Their Use And Monetization Of Stolen Data

This paper presents the Testimony of Lillian Ablon before the Committee on Financial Services Subcommittee on Terrorism and Illicit Finance United States House of Representatives on March 15, 2018

(more available)
Added: October 14, 2018
image from Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

Deploying A Cyber Risk Strategy: Five Key Moves Beyond Regulatory Compliance

In this paper, they explore the underlying challenges with regard to Cyber Risk management and analyze the nature of increasingly stringent regulatory demands. Putting these pieces together, they frame five strategic moves which they believe will enable business needs, their fiduciary responsibilities with regard to Cyber Risk, and regulatory requirements.

(more available)
Added: October 14, 2018
image from Enhancing Resilience through Cyber Incident Data Sharing and Analysis

Enhancing Resilience through Cyber Incident Data Sharing and Analysis

This document enumerates and evaluates consensus data categories that enterprise risk owners and insurers could use to assess risks, identify effective controls, and improve cybersecurity culture and practice. It is the second in a series of white papers.

(more available)
Added: October 14, 2018
image from Fortinet Threat Landscape Report Q1 2017

Fortinet Threat Landscape Report Q1 2017

In this report, you’ll find a few highlights of what FortiGuard Labs analysts gleaned from Q1 intelligence collections. After that, they hope you’ll hang around while they dig deep into the threat landscape to unearth nuggets of insight you definitely won’t want to miss.

(more available)
Added: October 14, 2018
image from FSecure 2017 State Of Cyber Security

FSecure 2017 State Of Cyber Security

This report gives detailed ideas behind having the proper plans for how to deal with Cybersecurity breaches.

Added: October 14, 2018
image from Global Fraud Report

Global Fraud Report

This report was based on 10 in-depth interviews and an additional online survey with 545 senior executives worldwide across multiple industries and geographies. The survey was fielded through July and August 2016. The scope of the research covers perceptions of and experiences with cyber and security risk.

(more available)
Added: October 14, 2018
image from GTIC Monthly Threat Report April 2018

GTIC Monthly Threat Report April 2018

This monthly threat report takes a look at the month of April 2018. Specifically it looks at Ransomware and Cryptojacking battling for top threat spot, Russia Nation-State targeting network infrastructure, and supply chain attacks.

(more available)
Added: October 14, 2018
image from H2 2017 Global Cyber Attack Trends Report

H2 2017 Global Cyber Attack Trends Report

This report takes a look back at the events of the last year and ponders what might occur in 2018.

(more available)
Added: October 14, 2018
image from Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

Healthcare Cyber Research Report For 2017 A CryptoniteNXT Special Report

This Health Care Cyber Research Report for 2017 shares very recent research on cyberattacker activity in 2017 and the virtual explosion in the reported use of ransomware in attacking health care institutions. 2017 has been a very challenging year for health care institutions. They remain under sustained attack by cyberattackers that continue to target their networks through the use of well understood vulnerabilities.

(more available)
Added: October 14, 2018
image from Implications Of Using Privileged Access Management To Enable Next Generation Technology

Implications Of Using Privileged Access Management To Enable Next Generation Technology

To better understand how security issues, such as privileged access management (PAM), affect the adoption of next-generation technologies, BeyondTrust – the leader in PAM – commissioned the 2018 Implications of Using Privileged Access Management to Enable Next-Generation Technology survey. The results are a wake-up call for anyone looking to leverage these next-generation technologies.

(more available)
Added: October 14, 2018
image from Information Security and Cyber Liability Risk Management Report 2015

Information Security and Cyber Liability Risk Management Report 2015

This report is based on the findings of a collaborative survey that was designed to gain insight into the current state and ongoing trends in information security and cyber liability risk management. The survey was completed at least in part by 448 respondants which included risk managers, insurance buyers, and other risk professionals.

(more available)
Added: October 14, 2018
image from Intent-Based Networking And Extending The Enterprise

Intent-Based Networking And Extending The Enterprise

Cisco provides a brief report that discusses intent based networking and the enterprise.

Added: October 14, 2018
image from Is Security Accelerating Your Business

Is Security Accelerating Your Business

This blog post discusse the issues surrounding business data security, and provides some steps that can be taken to improve the situation.

(more available)
Added: October 14, 2018
image from M-Trends 2017

M-Trends 2017

From the report, “For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive year, we have included insights from our FireEye as a Service (FaaS) teams. FaaS monitors organizations 24/7, which gives them a unique perspective into the current threat landscape. Additionally, this year we partnered with law firm DLA Piper for a discussion of the upcoming changes in EMEA data protection laws.”

(more available)
Added: October 14, 2018
image from Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

Metrics (Not Just Fun Facts!) Are Key To Driving a Business-Driven Security Strategy

This blog post discusses the point that organizations need to assess cybersecurity as a business enabler, rather than a hindrance.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 84
  • 85
  • 86
  • 87
  • 88
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)