Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Engineering

Below you will find reports with the tag of “Social Engineering”

image from 2016 Norton Cyber Security Insights Report

2016 Norton Cyber Security Insights Report

This report finds that victims of cybercrime within the past year often continued their unsafe behavior. This report details and discusses this issue.

(more available)
Added: October 12, 2018
image from 2017 Data Breach Investigations Report

2017 Data Breach Investigations Report

As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors.

(more available)
Added: October 12, 2018
image from 2017 Phishing Response Trends Australia Region

2017 Phishing Response Trends Australia Region

This report provides insight into survey responses regarding Phishing campaigns, and their impact on organizations.

Added: October 12, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from GDPR Cheat Sheet For Cybersecurity Professionals

GDPR Cheat Sheet For Cybersecurity Professionals

This paper provides a simple approach to understanding and implementing GDPR compliance.

Added: October 12, 2018
image from Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

Hacking Is Not Random:A Case Control Study of Webserver Compromise Risk

This paper investigates many observable characteristics of web-servers that may affect the likelihood of compromise.

Added: October 12, 2018
image from The Four Pillars Of Modern Vulnerability Management

The Four Pillars Of Modern Vulnerability Management

This report breaks down four strategic pillars of handling vulnerability management.

Added: October 12, 2018
image from The Human Factor 2018: People Centered Threats Drive The Landscape

The Human Factor 2018: People Centered Threats Drive The Landscape

This report offers insight into the human factor and how cybercriminals have continued to recognize that the greatest vulnerability of an organization is the humans that run it.

(more available)
Added: October 12, 2018
image from The Weakest Link: Why People Are Your Network's Greatest Vulnerability

The Weakest Link: Why People Are Your Network's Greatest Vulnerability

In this white paper, they explore why people are the biggest vulnerability for most organizations, and whether it’s possible to ‘patch’ this vulnerability.

(more available)
Added: October 12, 2018
image from What CISO's Worry About In 2018

What CISO's Worry About In 2018

The purpose of the survey was to understand key concerns and opinions of Chief Information Security Officers and CIOs, focused on information security and cyber-risk, as we head into 2018.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 3, 2025 08:08 UTC (build b1d7be4)