Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Key Findings from The Global State of Information Security Survey 2016

Key Findings from The Global State of Information Security Survey 2016

This report is discussing the rising trend of organizations properly prioritizing the risks and dangers of cyber threats.

Added: October 12, 2018
image from Legal Cybersecurity Checklist

Legal Cybersecurity Checklist

This whitepaper seeks to provide aid to lawfirms and their need for security compliance with their clients.

Added: October 12, 2018
image from M-Trends 2015

M-Trends 2015

Mandiant consultants’ role as the first responders to critical security incidents gives them a unique vantage point into how attackers’ motives and tactics are changing . The insights and analysis presented here represent their combined experience over the course of hundreds of service engagements . Over the last decade, they have helped clients across more than 30 industries around the globe .

(more available)
Added: October 12, 2018
image from Managing Cybersecurity: The Cyber Risk Protection Story 2018

Managing Cybersecurity: The Cyber Risk Protection Story 2018

Marsh & McLennan Agency surveyed 1,141 executives from small to middle-market organizations across North America, and found that they are clearly concerned about cyber risk — but, by their own admission, they do not have a grasp of how to protect themselves.

(more available)
Added: October 12, 2018
image from Network Threat Detection

Network Threat Detection

This report aims to compare the effectiveness of a selection of threat detection appliances. The products were exposed to internet threats that were live during the test period, as well as crafted exploit-based attacks.

(more available)
Added: October 12, 2018
image from Panda Labs Annual Report 2017

Panda Labs Annual Report 2017

This report discusses events of 2017 and lays out trends and predictions for 2018, including the secret of how to fight malware. In this report’s conclusion, they go a little more into detail, but ultimately the secret is “forgetting about” malware. If we focus on fighting malware, the battle is lost before it has begun.

(more available)
Added: October 12, 2018
image from Producing Your Network Security Policy

Producing Your Network Security Policy

This paper is designed to help you put together your organization’s network security policy.

Added: October 12, 2018
image from Regional Advanced Threat Report: Latin America 1H 2015

Regional Advanced Threat Report: Latin America 1H 2015

This report discusses trends in the cyber security environment in Latin America from January to June 2015.

Added: October 12, 2018
image from RiskTeller: Predicting the Risk of Cyber Incidents

RiskTeller: Predicting the Risk of Cyber Incidents

This paper from CCS 2017, presents a system that analyzes binary file appearance logs of machines to predict which machines are at risk of infection months in advance.

(more available)
Added: October 12, 2018
image from Security Healthcare Information Security Guide

Security Healthcare Information Security Guide

This report provides a collection of articles on Healthcare Security.

Added: October 12, 2018
image from SQL Injection Defense: There are no Silver Bullets

SQL Injection Defense: There are no Silver Bullets

In this technical whitepaper they explain why there’s no single silver bullet answer to SQL injection.

Added: October 12, 2018
image from Tackling Data Privacy To Unlock The Power Of Big Data Analytics

Tackling Data Privacy To Unlock The Power Of Big Data Analytics

From the report, “Overall, the power of big data analytics is clear, but some fundamental building blocks need to be in place if banks are to unlock that power for commercial benefit.”

(more available)
Added: October 12, 2018
image from Taking The Offensive

Taking The Offensive

This paper discusses the necessary element of collaboration that is required for success fighting cybercrime.

Added: October 12, 2018
image from Ten Key Questions on Cyber Risk and Cyber Risk Insurance

Ten Key Questions on Cyber Risk and Cyber Risk Insurance

By providing an overview of the main areas of research and the key studies conducted in the field to date, and by making some initial recommendations about the potential role of insurers and governments in addressing cyber risks, this report lays the groundwork for discussion and future research on the development of the cyber risk and the cyber insurance market.

(more available)
Added: October 12, 2018
image from The CISO Ascends From Technologist To Strategic Business Enabler

The CISO Ascends From Technologist To Strategic Business Enabler

This first report in a multipart series, which appraises various cybersecurity occupations using natural language processing (NLP), examines the role of the CISO from the vantage point of employer job ads and CISO resumes . Findings show that the role and prominence of the chief information security officer (CISO) continue to expand and transform . CISOs are no longer seen as technologists tasked to manage their organizations’ security risks . Much more than security tacticians, CISOs are seen as business strategists who reach across organizational boundaries to build business-level relationships and orchestrate business strategies that enable digital transformation and govern compliance-related issues. Key takeaways of the analysis are broken into two sections: 1) hard and soft skills, and 2) education and career demographics .

(more available)
Added: October 12, 2018
image from The Dirty Secrets Of Network Firewalls

The Dirty Secrets Of Network Firewalls

In late 2017, Sophos sponsored an independent research study into the state of network security in mid-sized organizations across the globe. This research program explored the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.

(more available)
Added: October 12, 2018
image from The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

The Fake News Machine: How Propagandists Abuse The Internet And Manipulate The Public

This paper studies and explores the techniques and methods used by actors to spread fake news and manipulate public opinion to serve various motives ranging from personal and financial to political. It also discusses the three legs of the fake news triangle: the services that enable them, their appearance on social media sites, and the motivations behind these activities.

(more available)
Added: October 12, 2018
image from The GDPR: An Action Guide

The GDPR: An Action Guide

This is a recently updated eBook that lays out an action guide for compliance with the EU’s GDPR.

Added: October 12, 2018
image from The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year.

Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
image from Threat Intelligence Executive Report 2017: Volume 3

Threat Intelligence Executive Report 2017: Volume 3

This Threat Report takes a look at some of the events of spring 2017. Specifically, it looks at criminal campaigns that leveraged exploits exposed by the Shadow Brokers, threat groups that used social media profiles, a threat group that attacked supply chains of large corporations, quickly evicting threat actors from a compromised environment.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 89
  • 90
  • 91
  • 92
  • 93
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 00:08 UTC (build b1d7be4)