Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Under Threat or Compromise

Under Threat or Compromise

This paper outlines five major components of a life-cycle approach to defense and how companies can adopt this model to maximize security in the current threat landscape.

(more available)
Added: October 14, 2018
image from What's Hindering Interoperability Across Healthcare Networks

What's Hindering Interoperability Across Healthcare Networks

Interoperability between healthcare networks is a major goal and a major challenge for many healthcare providers. Combining today’s advanced cyberthreats and the challenges of HIPAA compliance makes sharing PHI a daunting task for many healthcare groups. Read this paper to learn how interoperability and HIPAA compliance are achievable.

(more available)
Added: October 14, 2018
image from X-Force Threat Intelligence Index 2017

X-Force Threat Intelligence Index 2017

The Threat Intelligence Index outlines the security threat landscape based on data gathered for the entire year of 2016. It uses data developed by analyzing “billions" of events, monitored by IBM security services, in more than 100 countries.

(more available)
Added: October 14, 2018
image from 2015 Cost of Cyber Crime Study: United States

2015 Cost of Cyber Crime Study: United States

Our goal is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack.

(more available)
Added: October 13, 2018
image from 2015 Internet Security Threat Report, Volume 20

2015 Internet Security Threat Report, Volume 20

This annual Threat Report, gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

(more available)
Added: October 13, 2018
image from 2017 Phishing Response Trends Europe Region

2017 Phishing Response Trends Europe Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 13, 2018
image from 2017 Security Pressures Report

2017 Security Pressures Report

For ease of consumption, this report is designed into individual sections of “pressures” each featuring insightful context and convenient data tables, with the results compared against last year’s findings as a way of understanding the state of security. In addition, we have broken out the results by country to include the United States, United Kingdom, Canada, Australia, Singapore – and for the first time – Japan. Like in years past, you will find some of the comparison data is particularly intriguing and revealing into the mindset of IT and security professionals based on their region.

(more available)
Added: October 13, 2018
image from 2017 State Of Bug Bounty Report

2017 State Of Bug Bounty Report

This report mines that data and details to provide an inside look to the economics and emerging trends of managed bug bounty programs.

(more available)
Added: October 13, 2018
image from 2018 Security Predictions

2018 Security Predictions

In this report, they describe major security shifts we expect in 2018. At the heart of many of these predictions is a requirement to understand the intersection of people, critical data and IP – the human point. By placing behavior and intent at the center of security, security professionals can keep up with technological innovations to come.

(more available)
Added: October 13, 2018
image from 5 Steps To Executing A Mobile Defense Strategy

5 Steps To Executing A Mobile Defense Strategy

This paper provides a simple guide to executing a mobile defense strategy.

Added: October 13, 2018
image from Businesses At Work

Businesses At Work

Businesses @ Work takes an in-depth look into how organizations and people work today—exploring employees, partners, contractors, and customers, and the apps and services they use to be productive.

(more available)
Added: October 13, 2018
image from CEO Survey:Summary And Key Findings

CEO Survey:Summary And Key Findings

RedSeal polled 200 CEO’s about their confidence in their companies’ cybersecurity posture, and discovered that they are dangerously unrealistic about how vulnerable they are.

(more available)
Added: October 13, 2018
image from Continuous Monitoring And Compliance In The Cloud

Continuous Monitoring And Compliance In The Cloud

This whitepaper takes a look at the issues of using and implementing continuous monitoring and maintaining government compliance.

Added: October 13, 2018
image from Controlling Lateral Movement In Unix And Linux Environments

Controlling Lateral Movement In Unix And Linux Environments

This technical brief will describe how you can use PowerBroker for Unix & Linux in your *NIX server environment to address and enforce the NIST requirements, as well as the principles of a mature system access model to limit or prevent lateral movement within your environment. These principles apply to identity management, access control, and server configuration and monitoring, operating as a triad to support a strong security program.

(more available)
Added: October 13, 2018
image from CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

CTI in Security Operations:SANS 2018 CyberThreat Intelligence Report

This is the result of SANS 2018 Cyber Threat Intelligence Survey. The survey focuses on how organizations could collect security intelligence data from a variety of sources, and then recogniza and act up on indicators of attach and compromise scenarious in a timely manner.

(more available)
Added: October 13, 2018
image from Cyber Risk Appetite Survey January 2017

Cyber Risk Appetite Survey January 2017

The primary objective of the RSA Cyber Risk Appetite Survey is to understand the behaviors and practices of organizations in regard to cyber risk. More specifically, the report aims to calculate the risk appetites of different respondent organizations. The global research is based on responses from 272 risk and security professionals at organizations.

(more available)
Added: October 13, 2018
image from Cyber Security Economic Issues

Cyber Security Economic Issues

The emerging field of cybersecurity economics could benefit from better data, better under- standing, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity invest- ment decisions. In particular, it suggests that companies, the government, and other organizations can help improve our under- standing of cybersecurity economics by moni- toring cybersecurity incidents and responses, soliciting and using standard terminology and measures, and sharing data whenever possible.

(more available)
Added: October 13, 2018
image from Cyber Vulnerability Index report

Cyber Vulnerability Index report

The report focuses on how insurance can help make UK companies more resilient to the cyber threat, and is the result of co-operation between representatives of the UK Government and the insurance industry, led by the Cabinet Office and Marsh.

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Report

Cybersecurity Insights Report

This research explores the personal impact of online crime. “Our hope is that the findings will move people from general awareness online of the threats to a clearer sense of what’s at risk and why they should care—and take action.”

(more available)
Added: October 13, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
image from Data Centric Approach To Endpoint Secuirty

Data Centric Approach To Endpoint Secuirty

This paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the reange of considerations and concrete next steps in the decision-making process.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 86
  • 87
  • 88
  • 89
  • 90
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 20:08 UTC (build b1d7be4)