Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Actor

Below you will find reports with the tag of “Threat Actor”

image from Threat Advisory: Skyscape

Threat Advisory: Skyscape

This is a threat advisory for Skyscape

Added: October 18, 2018
image from Threat Landscape 2015

Threat Landscape 2015

For yet another year the 2015 edition of the cyber-threat landscape features a number of unique observations, the main one being the smooth advancement of maturity. As a matter of fact, cyber-space stakeholders have gone through varying degrees of further maturity. While the friendly agents – the good guys – have demonstrated increased cooperation and orchestrated reaction to cyber-threats, hostile agents – the bad guys – have advanced their malicious tools with obfuscation, stealthiness and striking power.

(more available)
Added: October 18, 2018
image from Threat Landscape Report Q4 2016

Threat Landscape Report Q4 2016

This report seeks to draw an accurate representation of the cyber threat landscape in Q4 2016 leveraging the vast information resources and expertise of FortiGuard Labs. We seek to share our perspective on the threats that exist, how often they occur, what differs across sectors and regions, and what’s changing over time.

(more available)
Added: October 18, 2018
image from Top 5 Data Security Threats

Top 5 Data Security Threats

This Report takes a look at the top 5 data security threats and analyzes what a company can do about them.

(more available)
Added: October 18, 2018
image from UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

UK Cities Exposed: A Shodan-based Security Study On Exposed Cyber Assets In The UK

This paper takes a look at the cities of the United Kingdom, and the cyber threats that occurred there.

Added: October 18, 2018
image from 2015 Dell Security Annual Threat Report

2015 Dell Security Annual Threat Report

An annual report on cybersecurity threats in 2015.

Added: October 17, 2018
image from 2016 Cyber Weapons Report

2016 Cyber Weapons Report

A Bulleton recapping headlines and stores in the Global Insurance and Regulatory industry.

Added: October 17, 2018
image from 2017 Government Internet Security Threat Report, Volume 22

2017 Government Internet Security Threat Report, Volume 22

This is the Government focussed version of the annual 2017 Security Threat Report from Symantec.

Added: October 17, 2018
image from 2017 Quarterly Threat Report Q3

2017 Quarterly Threat Report Q3

This report takes a look at the cyber threats that took place in the 3rd Quarter of 2017. It provides a good concise look at what business sectors were most under threat.

(more available)
Added: October 17, 2018
image from 2018 Malware Trends Forecast

2018 Malware Trends Forecast

Barkly offers their insight into the Malware landscape, and what they project will occur in 2018.

Added: October 17, 2018
image from 2018 Security Report

2018 Security Report

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

(more available)
Added: October 17, 2018
image from AI Based Prevention And Detection

AI Based Prevention And Detection

This report discusses the new evolution in Endpoint Security.

Added: October 17, 2018
image from Authentication Survival Guide

Authentication Survival Guide

This book aims to be an accessible starting point for everyone that is starting to work with authentication. In this book, you’ll find a concise review of all the key protocols, formats, concepts and terminology that you’ll likely come across when implementing authentication.

(more available)
Added: October 17, 2018
image from CISO Tips: Speaking the language of business

CISO Tips: Speaking the language of business

What’s not open to discussion is that the role of information security executives has evolved. CISOs may now find themselves talking to investors about how an attack impacted quarterly earnings in addition to more traditional duties like managing a SOC.

(more available)
Added: October 17, 2018
image from Cyber Risk Report 2015

Cyber Risk Report 2015

The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

(more available)
Added: October 17, 2018
image from Cyber Threats To The Healthcare And Health Insurance Industries

Cyber Threats To The Healthcare And Health Insurance Industries

Learn about current and impending cyber threats to the healthcare and health insurance industry.

Added: October 17, 2018
image from Cyber-Security Perceptions And Realities: A View From The C-Suite

Cyber-Security Perceptions And Realities: A View From The C-Suite

This Report is based on the findings of a survey that sought to understand the priorities and viewpoint of the Executive members of multiple organizations around the world, as pertains to cyber-secuirty issues.

(more available)
Added: October 17, 2018
image from CyberArk Global Advanced Threat Landscape Report 2018

CyberArk Global Advanced Threat Landscape Report 2018

According to the 11th annual CyberArk Global Advanced Threat Landscape Report, while organizations face diverse, dynamic and increasingly damaging cyber security threats, many remain hamstrung by inertia and uncertainty. This is the third and final installment of the 2018 report, which is the result of responses from 1,300 IT professionals, business leaders, application developers and DevOps practitioners from seven countries.

(more available)
Added: October 17, 2018
image from Cybersecurity For Risk Mitigation In Financial Services

Cybersecurity For Risk Mitigation In Financial Services

From the paper, “The financial industry is no stranger to hacks and data breaches, but recently, the sector has been targeted more aggressively, leaving consumers wondering if their accounts and data are safe. As hackers and attacks become more sophisticated, it is crucial the financial services industry take appropriate actions to safeguard their systems, as well as their customers.”

(more available)
Added: October 17, 2018
image from Cybersecurity Risk Management Oversight

Cybersecurity Risk Management Oversight

This report takes a look at how accountants and other board members analyze cybersecurity.

Added: October 17, 2018
image from Data Breach Digest: Perspective Is Reality

Data Breach Digest: Perspective Is Reality

This report offers a helpful understanding of data breaches.

Added: October 17, 2018
  • ««
  • «
  • 69
  • 70
  • 71
  • 72
  • 73
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 2, 2025 04:08 UTC (build b1d7be4)