Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Social Media

Below you will find reports with the tag of “Social Media”

image from The State of Stalkerware in 2020

The State of Stalkerware in 2020

This report aims to examine the issue of stalkerware. They present data to understand the changes and scale of the problem in 2020.

(more available)
Added: February 28, 2021
image from Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic

This report covers the cybersecurity threats tied to COVID-19 pandemic observed over the past year, detailing the socioeconomic drivers that contributed to the threat landscape.

(more available)
Added: January 29, 2021
image from Online Purchase Scams Report 2020

Online Purchase Scams Report 2020

This report looks at online purchase scams, going into the overall impact of them, how scammers are engaging with their targets, monetary losses associated with online purchase scams, and the overall risk of an online purchase scam.

(more available)
Added: December 1, 2020
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI.

(more available)
Added: November 30, 2020
image from State of Third-Party Risk Management 2020

State of Third-Party Risk Management 2020

A survey-driven report of over 150 third-party risk practitioners to understand the challenges facing their programs, the actions those professionals are taking to address the challenges, and identify success factors.

(more available)
Added: November 5, 2020
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year.

(more available)
Added: November 1, 2020
image from Company-Issued Computers: What Are Employees Really Doing With Them?

Company-Issued Computers: What Are Employees Really Doing With Them?

This report comes from a survey of more than 1,000 businesspeople around the world that have a company-issued computing device. It looks into what people are using their work computers for, and how that can leave them vulnerable to cyber threats.

(more available)
Added: October 29, 2020
image from Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

Phishing Landscape 2020: A Study of the Scope and Distribution of Phishing

This study captures and analyzes a large set of information about phishing attacks, in order to better understand how much phishing is taking place, where it is taking place, and to see if the data suggests better ways to fight phishing.

(more available)
Added: October 14, 2020
image from Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

Protecting People 2019: A global Cybersecurity Analysis of Vulnerability, Attacks and Privilege

This report examines which employees, departments, and industries are the most vulnerable in 2019. It analyzes which ones receive the most targeted threats, and how their privilege might be abused.

(more available)
Added: September 28, 2020
image from The 2020 (ISC)2  Cybersecurity Perception Study

The 2020 (ISC)2 Cybersecurity Perception Study

This report discusses the perceptions uncovered by the study and provides conclusions that hiring organizations should consider as they work to locate and recruit additional staff to their cybersecurity teams.

(more available)
Added: September 27, 2020
image from Cybersecurity Trends 2020

Cybersecurity Trends 2020

This annual report outlines expected cybersecurity trends for the coming year.

Added: July 30, 2020
image from Reimagining Customer Privacy for the Digital Age

Reimagining Customer Privacy for the Digital Age

This report by Deloitte goes in-depth into the state of consumer privacy, breaking it down into 8 categories: Association/Group Privacy, Location and Space, Personal Communication, Biological data, Images, Thoughts and Feelings, Behavior and Actions, and Traditional Identifiers. It explains each category thoroughly.

(more available)
Added: June 29, 2020
image from The 2020 Hacker Report

The 2020 Hacker Report

The fourth annual report from Hacker One on the state of the open security testing community, using data from Hacker One’s bug bounty program.

(more available)
Added: June 23, 2020
image from The Fraud Beat 2018

The Fraud Beat 2018

This report goes in-depth on the most popular fraud techniques and how to prevent fraud attacks on your business.

Added: June 23, 2020
image from Privacy in the Wake of COVID-19

Privacy in the Wake of COVID-19

A survey of 933 respondants on changes to privacy and data protection after COVID-19 and how companies are keeping their data protected.

(more available)
Added: June 22, 2020
image from Human Factor Report 2019

Human Factor Report 2019

An annual report derived from the Proofpoint customer base and the emails processed by the Proofpoint email security platform. Focuses on the “human factor” of organizational cyber security.

(more available)
Added: June 13, 2020
image from DNS Network Traffic Volumes During the 2020 Pandemic

DNS Network Traffic Volumes During the 2020 Pandemic

Review of DNS traffic trends during the 2020 COVID-19 pandemic as an indicator of enterprise activity and possible DDOS events.

(more available)
Added: May 28, 2020
image from Cyber Business Executive Reserarch: Security Leadership Talent Gap

Cyber Business Executive Reserarch: Security Leadership Talent Gap

This report seeks to provide actionable insight and practical advice to help organizations increase talent-gap resilience and avoid being left behind as the industry evolves.

(more available)
Added: May 19, 2020
image from Protecting your personal data online at every point

Protecting your personal data online at every point

To protect the data we store on our devices and upload online, we first need to understand where the key risks may lie. This report reviews some of the main stories and tactics we have seen affecting data privacy over the past 12 months and provides advice on how individuals can keep control over their personal data at every turn.

(more available)
Added: May 18, 2020
image from Cloud companies appear to be silver lining as coronavirus dampens IT spending

Cloud companies appear to be silver lining as coronavirus dampens IT spending

COVID-19 is already beginning to weigh on corporate IT security budgets, but as millions work from home, one survey is nding a spending shift to cloud providers and security and away from PCs and servers.

(more available)
Added: May 18, 2020
image from Hook, Line, and Sinker- Why Phishing Attacks Work

Hook, Line, and Sinker- Why Phishing Attacks Work

In this report, we’ll dig deeper into the survey results and present our own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from our customers and partners, and tips on how to stay safe from phishing threats.

(more available)
Added: May 11, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 30, 2025 20:08 UTC (build b1d7be4)