Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from The 2024 Crypto Maturity Jouney

The 2024 Crypto Maturity Jouney

The Crypto Maturity Journey outlines considerations for cryptocurrency product rollout, enabling FIs to evaluate market opportunities while simultaneously addressing regulatory and compliance requirements. Over the last few years, cryptocurrency has become a mainstream asset class, with institutional investments as one factor in boosting adoption around the world. Institutions such as BlackRock, Fidelity, and Grayscale have launched Bitcoin and Ethereum ETPs, providing a more accessible avenue for retail and institutional investors to gain exposure to these digital assets.

(more available)
Added: February 18, 2025
image from 2025 Data Breach Industry Forecast

2025 Data Breach Industry Forecast

In our 12th annual Data Breach Industry Forecast, our focus covers a wide swath of attacks from the personal (teens exploitation), corporate (increases in internal fraud), national (using dynamic identification as a fraud defense), and global (bad actors pursuing data centers). Spanning all these predictions is the dramatically accelerated speed and scaling of cyberattacks that are AI-enabled. This year’s predictions come from Experian’s long history of helping companies navigate breaches over the past 22 years.

(more available)
Added: December 30, 2024
image from 2024 Data Privacy Trends

2024 Data Privacy Trends

DataGrail’s 2024 Data Privacy Trends Report shows how these factors are playing out on the ground and provides a benchmark for businesses to see how they are tracking. Businesses are receiving more privacy requests, also known as Data Subject Requests (DSRs) every year; we saw a 246% increase in requests from 2021 to 2023.

(more available)
Added: September 25, 2024
image from The True Cost of CVE Management in Containers

The True Cost of CVE Management in Containers

Common Vulnerabilities and Exposures (aka CVEs) in containers, at least according to the interviews conducted for this study, are a pain (in the vuln). Chainguard conducted ten interviews with software professionals at a range of companies that build or operate containers. The interview questions dealt with the processes and workflows that these professionals use to identify, triage, and remediate CVEs in containers. Many of the questions either involved a request for a time estimate of each step of the process or probed the “why” behind the process or workflow.

(more available)
Added: September 24, 2024
image from 2024 State of the Press Release Report

2024 State of the Press Release Report

For this year’s report, we asked comms pros how they are currently using gen AI to help them craft press release content. The answers reveal a willingness among some PR practitioners to test multiple use cases for AI that help streamline the press release creation process. While challenges remain, comms pros reported experiencing several downstream benefits of distributing press releases across the newswire.

(more available)
Added: September 20, 2024
image from 2024 State of the Media Report

2024 State of the Media Report

The 2024 State of the Media: Tech Edition is a subsection of that report, zeroing in on the behaviors and perspectives of journalists and media influencers who cover the technology and engineering industry, a pool of over 500 respondents. We examined their specific challenges and implications for the PR professionals seeking to work with them, as well as the potential opportunities. Our respondents provided candid insights into what they want and need from public relations professionals whose organizations and clients strive to build brand awareness, consumer trust, and thought leadership in the technology and engineering sector.

(more available)
Added: July 12, 2024
image from GreyNoise 2022 Mass Exploitation Report

GreyNoise 2022 Mass Exploitation Report

That is the purpose of this report is to show you the hours saved, the data aggregated, and the research methodologies laid bare. you’ll find several sections covering some of the bigger mass exploitations of 2022, also known as celebrity vulnerabilities.

(more available)
Added: June 5, 2024
image from 2024 Secure Cloud Networking Field Report

2024 Secure Cloud Networking Field Report

This survey conducted by Aviatrix explores the trends impacting global cloud, networking, and security practitioners, and how they’re impacting the bottom line for enterprises worldwide. This report will look more closely at the causes and impacts of these findings, as well as recommendations for improving enterprise and industry outcomes in the future.

(more available)
Added: April 22, 2024
image from Flashpoint 2024 Global Threat Intelligence Report

Flashpoint 2024 Global Threat Intelligence Report

The Flashpoint 2024 Global Threat Intelligence Report offers a critical examination of the current threat environment. This year’s analysis goes beyond traditional threat intelligence, incorporating Flashpoint’s unparalleled data and insights to shed light on cyber threats, geopolitical turmoil, and escalating physical conflicts around the world. The goal: help your organization to strengthen its defenses, ensure operational resilience, and proactively confront multifaceted threats—thereby safeguarding critical assets, preventing financial losses, and protecting lives.

(more available)
Added: April 3, 2024
image from The 2023 Crypto Crime Report

The 2023 Crypto Crime Report

The events of this year have made clear that although blockchains are inherently transparent, the industry has room for improvement in this respect. There are opportunities to connect off-chain data on liabilities with on-chain data to provide better visibility, and transparency of DeFi, where all transactions are on-chain, is a standard that all crypto services should strive to achieve. As more and more value is transferred to the blockchain, all potential risks will become transparent, and we will have more complete visibility.

(more available)
Added: March 5, 2024
image from 2023 Impact Report

2023 Impact Report

This annual report features the work of 37 sophisticated cybersecurity teams working in partnership to advance 29 open-source projects that improve cyber defense for the whole community. This report captures the energy and passion that Center Participants bring to advancing threat- informed defense for all. Use it as a reference and share it with your teams and colleagues to further change the game on the adversary.

(more available)
Added: February 26, 2024
image from 2023 AI Media Landscape Report

2023 AI Media Landscape Report

The 2023 AI Media Landscape Report sheds light on some of the conversation surrounding one of today’s most talked-about topics: Artificial Intelligence (AI). Through our research, we sought to understand how traditional media outlets are covering the topic of AI as well as how social media users are discussing AI, and what both reveal around public perception of AI and the brands associated with AI.

(more available)
Added: November 6, 2023
image from State of Cybersecurity 2023

State of Cybersecurity 2023

The ninth annual ISACA global State of Cybersecurity Survey continues to identify current challenges and trends in the cybersecurity field. For the second consecutive year, ISACA fielded questions to gain deeper insight into persistent issues in cybersecurity workforce skill sets and staffing for entry-level positions. The State of Cybersecurity 2023 report analyzes the survey results on cybersecurity skills and staffing, resources, cyberthreats and cybersecurity maturity.

(more available)
Added: October 3, 2023
image from Cloudzy with a Chance of Ransomware

Cloudzy with a Chance of Ransomware

In this report, Halcyon demonstrates a unique method for identifying C2P entities that can potentially be used to forecast the precursors of ransomware campaigns and other attacks significantly “left of boom.” The ransomware economy is supported by a number of illicit groups that each provide one small piece of the puzzle that is cybercrime. From initial access brokers (IABs) to crypto money launderers, the criminal ecosystem that has sprung up around ransomware is vast.

(more available)
Added: August 11, 2023
image from CISC Engagement and Decision Drivers Study Report II, 2nd Half, 2022

CISC Engagement and Decision Drivers Study Report II, 2nd Half, 2022

In this report, we dive into measuring engagement, along with the most popular content types, and a roundup of the events that resonated most with audiences, offering key marketing takeaways on everything from intent topics to what has generated the most engagement through Q3 2022. We have also highlighted the brands generating the most engagement from their content marketing efforts. And we factor in how newsworthy cybersecurity events impact audience engagement, and content preferences.

(more available)
Added: August 3, 2023
image from Beware the Artificial Imposter Report

Beware the Artificial Imposter Report

In this report, the McAfee Labs team conducted an in-depth analysis and review of AI-cloning tools to evaluate the pervasiveness of the technology used in these scams and to discover how they could help consumers better protect themselves.

(more available)
Added: July 6, 2023
image from 2022 Everywhere Workplace Report

2022 Everywhere Workplace Report

This report features some of the most compelling data from our survey and gives actionable insights to leaders hoping to accelerate progress and enhance the employee experience in the Everywhere Workplace.

(more available)
Added: June 29, 2023
image from Understanding the Serious Risks to Executives' Personal Cybersecurity & Digital Lives

Understanding the Serious Risks to Executives' Personal Cybersecurity & Digital Lives

The purpose of this research is to understand the risks created by the cybersecurity gap between the corporate office and executives’ protection at home. According to 42% of respondents, their key executives and family members have already experienced at least one attack by a cybercriminal.

(more available)
Added: June 6, 2023
image from Navigating The Internet Risk Surface

Navigating The Internet Risk Surface

In this risk surface series, RiskRecon, a Mastercard Company, and Cyentia have worked to help third-party risk managers understand how to measure and manage risk. We’ve seen variation across industries and other slices. But not all firms are interchangeable. A payroll processor cannot be replaced with a janitorial supply company, at least not with good business outcomes! In this report, we look at what distinguishes top-performing firms from those that struggle the most. Armed with this knowledge, Third-Party Risk Management (TPRM) professionals can take into account the totality of their risk surface, and how it impacts the overall security performance of an organization

(more available)
Added: April 25, 2023
image from Open Source Security and Risk Analysis Report 2023

Open Source Security and Risk Analysis Report 2023

In its 8th edition this year, the 2023 “Open Source Security and Risk Analysis” (OSSRA) report delivers our annual in-depth look at the current state of open source security, compliance, licensing, and code quality risks in commercial software. We share these findings with the goal of helping security, legal, risk, and development team better understand the open source security and license risk landscape.

(more available)
Added: February 27, 2023
image from Advanced Threat Research Report Oct 2021

Advanced Threat Research Report Oct 2021

As 2021 progressed through its second quarter and into the third, cyber criminals introduced new - and updated - threats and tactics in campaigns targeting prominent sectors. Ransomware campaigns maintained their prevalence while evolving their business models to extract valuable data and millions in ransoms from enterprises big and small. REvil/Sodinokibi topped our list of ransomware detection in Q2 of 2021.

(more available)
Added: February 27, 2023
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 23, 2025 12:08 UTC (build b1d7be4)