Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Security Incident

Below you will find reports with the tag of “Security Incident”

image from Turning DDoS From A Cost Center To A Revenue Generator

Turning DDoS From A Cost Center To A Revenue Generator

Based on a survey conducted in 2017, this e-Book offers a unique perspective on the cost effectiveness of DDoS security.

(more available)
Added: October 12, 2018
image from Using Deception to Hunt Cyber Attackers

Using Deception to Hunt Cyber Attackers

From the report, “Today, there are a great many detection (identification and tracking) tools. However, there is not enough emphasis on trapping, resulting in a lack of effective trapping tools and techniques. An effective technique for automating the tracking of cyber attackers and, once found, trapping them, is deception. When implemented well, deception can automate and scale the hunting process, accurately identifying and tracking attackers, and trapping them to protect valuable assets while reducing valuable human resources in this never-ending competition of wits.”

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 89
  • 90
  • 91
  • 92
  • 93
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 08:08 UTC (build b1d7be4)