Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from 2016 CTAP Threat Landscape Report

2016 CTAP Threat Landscape Report

This report focuses on key metrics from the following verticals: 1) Education 2) Finance & Finance-related Businesses 3) Technology 4) Healthcare Additional data is provided that focuses on company size. In the following pages, we present specific data showing the types of attacks attempted on these networks and other key findings that we believe are of interest.

(more available)
Added: October 26, 2018
image from 2016 Hacked Website Report Q1

2016 Hacked Website Report Q1

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 26, 2018
image from 2016 Security Report

2016 Security Report

This document details how and why a company should be proactively scanning internal networks, segmenting network elements, and requiring multi-factor authentication also helps ensure security.

(more available)
Added: October 26, 2018
image from 2017 Year In Review Report

2017 Year In Review Report

This Annual report discusses the events and changes in the cybersecurity landscape of 2017.

Added: October 26, 2018
image from 2018 Annual Cybersecurity Report

2018 Annual Cybersecurity Report

In the executive summary, this report asks, “What if defenders could see the future?” it then goes on to say that defenders can see what’s on the horizon and many clues are out there and obvious. The entire report seeks to outline ways in which defenders can see the future.

(more available)
Added: October 26, 2018
image from 2018 Data Breach Investigations Report

2018 Data Breach Investigations Report

Verizon’s annual report on data breaches in 2018

Added: October 26, 2018
image from 2018 State Of Cyber Resilience

2018 State Of Cyber Resilience

Accenture research reveals the five steps that can help business leaders not only close the gap on cyber attackers, but also continue to transform and embed security into the fabric of their organizations within the next two to three years.

(more available)
Added: October 26, 2018
image from 2018 State Of Vulnerability Risk Management

2018 State Of Vulnerability Risk Management

This report offers an analysis into current trends in vulnerability risk management. It examines the attributes of security vulnerabilities viewed through a variety of lenses: Attributes of vulnerabilities published since 2002 versus those only recently published, Attributes of all vulnerabilities published in the National Vulnerability Database (NVD) in contrast with only those uploaded into our platform by our clients, Vulnerabilities broken down by industry vertical, CVSS score, product vendor and active exploitation in the wild.

(more available)
Added: October 26, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This group takes a look at Threat Hunting and examines how organizations are moving to a pro-active approach to cybersecurity.

(more available)
Added: October 26, 2018
image from 7 Myths About Network Management In A Digital World

7 Myths About Network Management In A Digital World

This e-book seeks to help you understand all of the many details necessary for succesful network management.

Added: October 26, 2018
image from A Guide To Endpoint Privilege Management: Secuirty Fundamentals

A Guide To Endpoint Privilege Management: Secuirty Fundamentals

In this whitepaper you will learn what endpoint privilege management is and how an effective approach significantly enhances an organization’s security against rising cyber crime. They cover the origins of the least privilege concept, the benefits of application control, the current cyber threat landscape and how endpoint privilege management works to combat this with minimal disruption to user productivity.

(more available)
Added: October 26, 2018
image from An Attack Pathway Into Your Organization? There's An App For That

An Attack Pathway Into Your Organization? There's An App For That

Recommendations for securing and managing privileged credentials used by enterprise applications

Added: October 26, 2018
image from Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

The research department at TopSpin Security conducted an experiment to investigate the performance of deception technologies in a simulated corporate environment in which more than 50 professional hackers and security experts used their knowledge and skills to try to extract a pre-defined piece of data and stay undetected. The experiment sought to answer a number of questions, including: 1) What kind of attacker will be attracted to what different type of resources (traps)? 2) What deception mechanisms should the defending organization employ? 3) Where should they be placed? 4) What kind of traps should be used Every attack pattern was carefully monitored and upon completion the data logged was analyzed and aggregated. Trends, attack patterns and statistics were derived from the data logged.

(more available)
Added: October 26, 2018
image from Best Practices For Privileged Identity Management In The Modern Enterprise

Best Practices For Privileged Identity Management In The Modern Enterprise

In this paper, they explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. They look at these and related trends impacting our data security and specifically, best practices on how to manage and govern privileged user access to mitigate these risks.

(more available)
Added: October 26, 2018
image from Cloud Security Trends: February 2018

Cloud Security Trends: February 2018

This is a report on cloud security trends.

Added: October 26, 2018
image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.

(more available)
Added: October 26, 2018
image from Cybersecurity Insights Volume 4: The CEO's Guide To Navigating The Threat Landscape

Cybersecurity Insights Volume 4: The CEO's Guide To Navigating The Threat Landscape

This report discusses ransomware and how organizations can better protect their digital assets.

Added: October 26, 2018
image from Demystifying Vulnerabilitiy Management

Demystifying Vulnerabilitiy Management

This report takes a close look at vulnerability management and seeks to make it a far simpler task.

Added: October 26, 2018
image from Healthcare And Cross Sector CyberSecurity Volume 16

Healthcare And Cross Sector CyberSecurity Volume 16

This report is specifically geared to the Healthcare and Cross-Sector Cybersecurity Issues.

Added: October 26, 2018
image from Healthcare Breach Report 2018

Healthcare Breach Report 2018

Bitglass’ fourth-annual Healthcare Breach Report analyzes data from the US Department of Health and Human Services’ “Wall of Shame,” where organizations that store or handle PHI are required to disclose breaches that affect at least 500 individuals. Read on to learn more about the breaches that caused the most damage in 2017 and to look at the year ahead in data security.

(more available)
Added: October 26, 2018
image from Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Identifying Insider Threats Through Machine Learning and Behavioral Analysis

Given that the most important information resides in databases, organizations are increasingly turning their focus toward databases security technologies. To defend databases from attackers using stolen credentials, the industry is beginning to adopt a new security paradigm based on machine learning and behavior analysis. This white paper discusses that paradigm shift and the issues that go along with it.

(more available)
Added: October 26, 2018
  • ««
  • «
  • 50
  • 51
  • 52
  • 53
  • 54
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 17, 2025 04:08 UTC (build b1d7be4)