Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from 2018 Web Application Security Report

2018 Web Application Security Report

Radware sought the opinions of senior executives and IT professionals responsible for network security at companies with a global reach. What follows is a summary of current global perceptions on the state of application attacks and insights on how to best identify and mitigate threats in the future.

(more available)
Added: October 22, 2018
image from 6 Key Use Cases For Securing Your Organizations Cloud Workloads

6 Key Use Cases For Securing Your Organizations Cloud Workloads

This ebook lays out several examples of how to effectively secure your cloud workloads.

Added: October 22, 2018
image from An Analysis Of Exposed IoT Technologies in China

An Analysis Of Exposed IoT Technologies in China

From the paper, “In terms of the technical roadmap, and considering the great differences between China and international IoT systems and products, this paper mainly analyzes IoT assets in China and describes their exposure. This helps illustrate what IoT devices and services are accessible on the Internet and their potential security problems, with the purpose of raising the public awareness of defending IoT.”

(more available)
Added: October 22, 2018
image from Application Usage and Threat Report

Application Usage and Threat Report

This report examines key trends across the threat landscape and application usage, including topics on how organizations can educate users and utilize controls to effectively reduce the attack surface available to an adversary, the potential effects of non-standard network activity, the reuse of legacy attack tactics, and the benefits of open threat intelligence sharing.

(more available)
Added: October 22, 2018
image from CISO Tips: Balancing the hero with the storyteller

CISO Tips: Balancing the hero with the storyteller

There’s no clear and direct career path to the role of infosec executive. But, there are skills that can help you advance your career to the management level, such as deep technical knowledge, strong communication skills and having business acumen.

(more available)
Added: October 22, 2018
image from Connected Healthcare: The Cybersecurity Threat Is Real And Impending

Connected Healthcare: The Cybersecurity Threat Is Real And Impending

This report discusses why it is important to protect medical device apps “in the wild”.

Added: October 22, 2018
image from DDoS Threat Report Q4 2016

DDoS Threat Report Q4 2016

This report takes a look at the DDoS threats that occurred in the fourth quarter of 2016.

Added: October 22, 2018
image from Five Phishing Predictions 2018

Five Phishing Predictions 2018

This report offers some significant predictions of phishing attacks in 2018.

Added: October 22, 2018
image from From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

From Insecurity To Resiliency: 2018 State Of Cyber Resilience For Banking & Capital Markets

Banking and capital markets firms have several things to be happy about in Accenture Security‘s comprehensive research study. Compared with the findings from last year’s report, the percentage of successful security breaches has decreased. The number of cybersecurity capabilities in banking increased from 15 to 19. Give this report a read.

(more available)
Added: October 22, 2018
image from Getting The Board On Board With Application Security

Getting The Board On Board With Application Security

It is the intention of this paper to provide you the reader with the essential tools and language that you can use to educate your board members on the importance and necessity of Application Security.

(more available)
Added: October 22, 2018
image from Global Information Security Survey 2015 Summary

Global Information Security Survey 2015 Summary

EY’s Global Information Security Survey investigates the most important cybersecurity issues facing businesses today. It captures the responses of 1,755 participants around the globe and across sectors, and our findings and conclusions are based on those insights and on our extensive global experience working with clients to help improve their cybersecurity.

(more available)
Added: October 22, 2018
image from GTIC Monthly Threat Report October 2017

GTIC Monthly Threat Report October 2017

This monthly threat report takes a look at the month of October 2017. More specifically, it takes a look at the shift in Phishing campaigns, the WIFI WPA Security VULN, and a variety of other threats.

(more available)
Added: October 22, 2018
image from Incident Response Reference Guide

Incident Response Reference Guide

This Guide aims to help businesses have a good response to cyber threat incidents.

Added: October 22, 2018
image from Insights Into Iranian Cyber Espionage APT33

Insights Into Iranian Cyber Espionage APT33

This blog post provides great discussion and insight into an APT operating out of Iran that is specifically targeting the Aerospace and Defense Industries.

(more available)
Added: October 22, 2018
image from Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and beyond: Reaping the dividends of cyber resilience is the latest viewpoint in PwC’s Insurance 2020 and beyond series, which explores the megatrends that are reshaping the competitive environment for insurers, reinsurers, brokers and the markets in which they operate.

(more available)
Added: October 22, 2018
image from ISTR Email Threats 2017

ISTR Email Threats 2017

This special report analyzes Email and the threats that occur in that environment.

Added: October 22, 2018
image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

Looking Forward And Looking Back: Lookout's Cybersecurity Predictions

This report offers insight into the cyber events of 2015 and makes predictions for 2016 - 2019.

Added: October 22, 2018
image from Mobile Threat Report Q3 2017

Mobile Threat Report Q3 2017

This report provides insights into the security events in mobile threats from the 3rd quarter of 2017

Added: October 22, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
image from Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

Not If But When: Why Community Banks and Credit Unions Should Invest In Fraud Protection

From the Report, “A common refrain from community banks and credit unions is that since they are not experiencing a fraud attack at the moment, they don’t see any need to invest in fraud protection. Now apply the same logic elsewhere – it follows then, that purchasing home insurance doesn’t make sense, as my house isn’t currently on fire. This kind of reasoning is short-sighted and leaves banks and their customers vulnerable to fraud–related financial losses. It also ignores a growing, if unfortunate, precedent – that losses from cyberattacks number in the billions of dollars annually (one report put it as high as $445 billion), and it continues to rise every year.”

(more available)
Added: October 22, 2018
  • ««
  • «
  • 59
  • 60
  • 61
  • 62
  • 63
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 15, 2025 12:12 UTC (build 0d9043b)