Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Duo Security's Two Factor Evaluation Guide

Duo Security's Two Factor Evaluation Guide

This guide provides comprehensive help for enterprises seeking to evaluate two factor authentication services.

Added: October 13, 2018
image from Equifax: A Cautionary Tale

Equifax: A Cautionary Tale

Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. Once the iceberg’s been hit, the response by employees, investors and even executives will surprise you. Here’s a breakdown of what happened to one of the largest credit agencies on the planet.

(more available)
Added: October 13, 2018
image from Game Plan for Closing the SecOPS Gap

Game Plan for Closing the SecOPS Gap

Forbes created a new survey. And, from that survey, a common theme emerged from the survey and the one-on-one interviews: today’s enterprises need a modern game plan that uses technology, people and processes to close the SecOps gap.

(more available)
Added: October 13, 2018
image from Getting Ready For The GDPR

Getting Ready For The GDPR

This whitepaper provides insight into getting ready for the GDPR.

Added: October 13, 2018
image from Going After The Weak Link: Security In Mergers & Acquisitions

Going After The Weak Link: Security In Mergers & Acquisitions

This report discusses the security issues involved in mergers and acquisitions of other organizations.

Added: October 13, 2018
image from How Software Composition Analysis Could Have Prevented The Equifax Breach

How Software Composition Analysis Could Have Prevented The Equifax Breach

This white paper takes a look at the Equifax breach of 2017 and offers a unique analysis at what could have prevented it.

(more available)
Added: October 13, 2018
image from IBM X-Force Threat Intelligence Quarterly, 1Q 2015

IBM X-Force Threat Intelligence Quarterly, 1Q 2015

This paper provides a complete roundup of cyber incidents in 2014.

Added: October 13, 2018
image from Identifying Critical Gaps in Database Security

Identifying Critical Gaps in Database Security

This white paper provides the results of a survey that looked to understand the weaknesses in the current state of database security.

(more available)
Added: October 13, 2018
image from M-Trends 2016

M-Trends 2016

In this issue, Mandiant presents their popular annual breach statistics, discuss three new trends that they have noticed, explore more in depth “Trends Turned Constants”, and include two additional articles to help support their interpretation of the numbers they present. The articles address the [re]Rise of Red Teaming operations, and how their FireEye as a Service (FaaS) service line is keeping companies safer and reducing the standard number of days compromised.

(more available)
Added: October 13, 2018
image from Microlearning: Small Bites, Big Cybersecurity Impact

Microlearning: Small Bites, Big Cybersecurity Impact

This whitepaper covers the six things every organization must have to “move the security awareness training” needle.

Added: October 13, 2018
image from Neustar DDOS Attacks & Protection Report:North America

Neustar DDOS Attacks & Protection Report:North America

Neustar’s 2015 DDoS Attacks and Protection Report spotlights the risks you face, and shows how companies throughout North America are aggressively defending themselves. The major change this year is the significant increase in the use of hybrid solutions (on-premises hardware plus cloud-based mitigation).

(more available)
Added: October 13, 2018
image from New Losses: Estimating the Global Cost of Cybercrime

New Losses: Estimating the Global Cost of Cybercrime

Covering a variety of regians, and industries, as well as types of cybercrime, this report gives a detailed analysis of the financial impact of cybercrime.

(more available)
Added: October 13, 2018
image from Pathways into Cybercrime

Pathways into Cybercrime

There are a number of young people in the UK that are are becoming involved in cyber dependent crime. This report aims to Collate, and analyze offender briefs to identify motivations and pathways into cyber crime, as well as review academic studies in this area, to identify key intervention points that should be targeted and identify gaps in understanding and propose recommendations.

(more available)
Added: October 13, 2018
image from PCI Compliance: Employee Awareness Is Key

PCI Compliance: Employee Awareness Is Key

This guide has been written to break down PCI requirements into layman’s terms and offer actionable insights into establishing a PCI-compliant security awareness program.

(more available)
Added: October 13, 2018
image from Quarterly Threat Report:First Quarter 2017

Quarterly Threat Report:First Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they have created additional views by day, hour, and event type by industry to give you a glimpse into both the workload variety and volume facing these unsung heroes of cybersecurity.

(more available)
Added: October 13, 2018
image from Ransomware:How To Predict, Prevent, Detect And Respond

Ransomware:How To Predict, Prevent, Detect And Respond

This report asserts that, “Many organizations still follow an outdated approach to cyber security, relying solely on a defensive perimeter to protect their infrastructure.” The report recommends a more robust, iterative approach, which can be broken down into four phases, Predict, Prevent, Detect, and Respond.

(more available)
Added: October 13, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report July 2016

SecureWorks Threat Intelligence Executive Monthly Report July 2016

This report from July 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 13, 2018
image from Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions

You’re convinced that protecting privileged accounts is paramount in your security strategy. But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, the following are seven questions to ask every potential vendor as part of your assessment.

(more available)
Added: October 13, 2018
image from Spies In The Enterprise

Spies In The Enterprise

Bitglass reports on the results of their survey regarding how cybersecurity teams are mitigating various threats in the cloud.

Added: October 13, 2018
image from Spotlight On 2017

Spotlight On 2017

This edition of Spotlight features a selection of work carried out in 2017 by the Rand Corporation, to help meet new and evolving challenges. They have completed several studies that examine the implications of Brexit for the UK, the EU, and beyond. They have examined the potential of increasingly advanced technology, including in the areas of cybersecurity and digital transactions. And they have evaluated and recommended improvements to be made along the path to better systems in health, policing and education.

(more available)
Added: October 13, 2018
image from SQL Injection Attacks: Detection In A Web Application Environment

SQL Injection Attacks: Detection In A Web Application Environment

This whitepaper provides an excellent resource for understanding SQL Injection attacks, in a web application environment.

Added: October 13, 2018
  • ««
  • «
  • 87
  • 88
  • 89
  • 90
  • 91
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)