Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat intel

Below you will find reports with the tag of “Threat intel”

image from Threat Intelligence Executive Report 2021 Vol. 3

Threat Intelligence Executive Report 2021 Vol. 3

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During March and April 2021, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider. (more available)
Added: April 21, 2022
image from Understanding XDR Requirements: What XDR Is and Why Organizations Need It

Understanding XDR Requirements: What XDR Is and Why Organizations Need It

CISOs aren’t alone in recognizing the need for new threat detection and response strategies. In fact, security technology providers are championing a new technology initiative dubbed eXtended Detection and Response (XDR). (more available)
Added: January 24, 2022
image from Security Outcomes Study Vol. 2

Security Outcomes Study Vol. 2

Over 5,100 IT and security professionals across 27 countries were asked about their organizations’ approaches to updating and integrating security architecture, detecting and responding to threats, and staying resilient when disaster strikes. (more available)
Added: December 7, 2021
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.
Added: October 5, 2021
image from How IT Security Leaders Can Unlock the Potential of Their Teams

How IT Security Leaders Can Unlock the Potential of Their Teams

This report looks at IT security teams. They highlight changes in the teams and the ways that they work.
Added: February 28, 2021
image from Internt of Tip-offs (IoT)

Internt of Tip-offs (IoT)

An analysis on the indicators to be derived from detecting Internet of Things (IoT) in organization’s public internet facing profiles.
Added: January 26, 2021
image from 2020 Year in Review: ENISA Threat Landscape

2020 Year in Review: ENISA Threat Landscape

This is the 8th annual Year in Review Report. It looks at cyber threat intelligence, sectoral and thematic threats, emerging trends, and the biggest incidents worldwide from the past year. (more available)
Added: November 1, 2020
image from 2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

2020 Midyear Cybersecurity Report: Securing the Pandemic-Disrupted Workplace

This report takes a look at the most significant stories and trends in order to determine what has changed and what to expect for the second half of 2020 in the cybersecurity industry. (more available)
Added: October 18, 2020
image from Network-layer DDoS attack trends for Q2 2020

Network-layer DDoS attack trends for Q2 2020

This report from Cloudflare shows trends and shifts in DDoS attacks for the 2nd quarter of 2020.
Added: September 25, 2020
image from The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

The 2020 Study on Staffing the IT Security Function in the Age of Automation: United States and United Kingdom

A survey of over 1,000 US and UK IT professionals on the challenges to having the necessary in-house expertise to achieve a strong cybersecurity posture. (more available)
Added: September 3, 2020
image from Survey Report: Evolution of the CASB

Survey Report: Evolution of the CASB

A survey-driven report of over 200 IT and security professionals on the practices and the objectives in their use of cloud access security broker (CASB) technologies. (more available)
Added: August 21, 2020
image from Global Cybersecurity Index 2018

Global Cybersecurity Index 2018

A survey driven review of 25 indicators via 50 questions spanning nearly 160 respondents. This attempts to focus on factors influencing cybersecurity strategy design and implementation on a year-over-year basis. (more available)
Added: August 1, 2020
image from 2020 Security Effectiveness Report

2020 Security Effectiveness Report

This report focuses on an analysis of security controls effectiveness across the multiple stages of attack lifecycles within 11 global industries. (more available)
Added: July 29, 2020
image from Simplify to Secure: Reduce complexity by integrating your security ecosystem

Simplify to Secure: Reduce complexity by integrating your security ecosystem

This report explains the findings of a study the did, showing that seeking the exact technology to solve your newest, most pressing security concern may actually be multiplying security gaps that slow you down instead of simplifying your security environment. (more available)
Added: July 29, 2020
image from 2019 Paid Ransomware Report

2019 Paid Ransomware Report

A review of 63 events where Kivu participated in payouts of ransomware events on behalf of clients engaged via a post-incident response. (more available)
Added: July 27, 2020
image from What Doxxing Victims Reveal About "Targeted Attacks"

What Doxxing Victims Reveal About "Targeted Attacks"

A review of doxxing related ransomware cases handled by Kivu Consulting in a post-breach role. Explores firmographics of the organizations involved in various variants of ransomware families. (more available)
Added: July 27, 2020
image from Cybersecurity Insights Volume 9: Security at the Speed of 5G

Cybersecurity Insights Volume 9: Security at the Speed of 5G

A survey-based report covering 704 cybersecurity professionals from organization with more than 500 employees. This edition has a special focus on the impact of 5G technologies for security professionals. (more available)
Added: June 12, 2020
image from Persistent Vulnerabilities, Their Causes and the Path Forward

Persistent Vulnerabilities, Their Causes and the Path Forward

Covers the long tail of vulnerability patching, whereby vulnerabilities that are not fixed soon after detection can linger for months or more before being addressed. (more available)
Added: June 5, 2020
image from AWS Shield: Threat Landscape Report - Q1 2020

AWS Shield: Threat Landscape Report - Q1 2020

The inaugural threat report from the AWS Shield managed security service. Primarily covers volumetric statistics seen on the AWS Shield platform. (more available)
Added: June 1, 2020
image from 2020 SANS Automation and Integration Survey

2020 SANS Automation and Integration Survey

Automation and integration is often hailed as a great enabler for the future. This survey identified how respondents are adopting systems, where their systems currently stand and what is on the planning horizon. (more available)
Added: May 21, 2020
image from Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

Smoke and Mirrors: Do AI and Machine Learning Make a Difference in Cyber security?

It’s clear from these findings that there is still a lot of confusion around artificial intelligence and machine learning, especially in terms of these technologies’ in business cybersecurity. (more available)
Added: May 18, 2020
  • ««
  • «
  • 1
  • 2
  • 3
  •  … 
  • 9
  • »
  • »»
© Cyentia Institute 2022
Library updated: May 28, 2022 08:08 UTC (build d6199b1)