Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Threat Intel

Below you will find reports with the tag of “Threat Intel”

image from Security Analytics And Operations In Transition

Security Analytics And Operations In Transition

This report seeks to offer insight into the cybersecurity world and to analyze the dangers and pitfalls of the transition in the profession.

(more available)
Added: October 23, 2018
image from Security Operations Centers - Helping You Get Ahead of Cybercrime

Security Operations Centers - Helping You Get Ahead of Cybercrime

This report discusses the necessity of Security Operations Centers, and how they can help with Cyber Events.

Added: October 23, 2018
image from The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

The Universal Gap In Preventing Breaches: Leak Path Detection And Mitigation

This paper takes a look at the best way to prevent breaches, by detecting and mitigating leaks.

Added: October 23, 2018
image from The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The Value Of Threat Intelligence: The Second Annual Study Of North American & United Kingdom Companies

The purpose of this research is to examine trends in the benefits of threat intelligence and the challenges companies face when integrating threat intelligence with existing security platforms and technologies.

(more available)
Added: October 23, 2018
image from Enterprise Mobile Security Pulse Report Q4 2017

Enterprise Mobile Security Pulse Report Q4 2017

The Appthority Enterprise Mobile Security Pulse Report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during our deep app analysis.

(more available)
Added: October 22, 2018
image from Global Information Security Survey 2015 Summary

Global Information Security Survey 2015 Summary

EY’s Global Information Security Survey investigates the most important cybersecurity issues facing businesses today. It captures the responses of 1,755 participants around the globe and across sectors, and our findings and conclusions are based on those insights and on our extensive global experience working with clients to help improve their cybersecurity.

(more available)
Added: October 22, 2018
image from Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and Beyond:Reaping the Dividends of Cyber Resilience

Insurance 2020 and beyond: Reaping the dividends of cyber resilience is the latest viewpoint in PwC’s Insurance 2020 and beyond series, which explores the megatrends that are reshaping the competitive environment for insurers, reinsurers, brokers and the markets in which they operate.

(more available)
Added: October 22, 2018
image from Recorded Future for SOC Teams Lab Test

Recorded Future for SOC Teams Lab Test

Details research regarding the company Recorded Future. Shows how this company aided in the effeciency of dealing with cyber attacks and threats.

(more available)
Added: October 22, 2018
image from The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

IBM Resilient and Ponemon Institute are pleased to release the findings of the study on the importance of cyber resilience for a strong security posture. We surveyed more than 413 IT and IT security professionals in the UK1, Only 25 percent of respondents say their organisation has a high level of cyber resilience. According to the findings, 71 percent of respondents believe their organisation is not prepared to recover from cyber attacks.

(more available)
Added: October 22, 2018
image from The Four Types Of Threat Detection

The Four Types Of Threat Detection

There is a considerable amount of market confusion around the types of threat detection, how they are derived, and the uses for each. The purpose of this paper is to address those challenges by identifying the four types of threat detection and offering sample use-cases focused on industrial control system (ICS) and industrial internet of things (IIoT) environments.

(more available)
Added: October 22, 2018
image from Threat Monitoring Detection Response Report 2017

Threat Monitoring Detection Response Report 2017

This study is a summary of responses from over 400 cybersecurity professionals to provide a comprehensive snapshot on the evolving threat landscape, insider and external threats, preventative measures, threat monitoring and data collection, threat intelligence, threat detection, threat hunting, threat analytics, incident response, and incident recovery.

(more available)
Added: October 22, 2018
image from 2018 CyberThreat Defense Report

2018 CyberThreat Defense Report

This report advertises itself as a “vendor-agnostic” report. Now in its fifth year, this report has become a staple among IT security leaders and practitioners. They stick to the usual suspects in cyber threats, but also outline some new areas related to Cloud investment, app containers, reliance on mobile devices, and the continuing damage of ransomware.

(more available)
Added: October 21, 2018
image from Cybersecurity Survey

Cybersecurity Survey

Based on a 2015 survey of more than 100 major Canadian organizations across all major sectors, this paper sets out to prove that with additional focus, investment, and increased maturity, not all breaches need to be the size or have the impact that we have seen recently reported.

(more available)
Added: October 21, 2018
image from Enterprise Mobile Security Pulse Report Q3 2017

Enterprise Mobile Security Pulse Report Q3 2017

This report is based on millions of mobile security scans Appthority performs each quarter for its enterprise customers. The report includes app, device and network data as well as their proprietary Mobile Threat Risk Score which measures the highest risk from thousands of data points during application analysis.

(more available)
Added: October 21, 2018
image from How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

How Cyber Threat Intelligence Safegaurds Against Today's Threat Landscape

This paper takes a look at Cyber Threat Intelligence.

Added: October 21, 2018
image from Incident Response Survey 2017

Incident Response Survey 2017

From the report, “In the following pages, we examine the results of the survey in detail and offer guidelines and feedback on how our industry can continue to improve. The show must go on—but it is far from over.”

(more available)
Added: October 21, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
image from March 2018 AppSec Intelligence Report

March 2018 AppSec Intelligence Report

This monthly report details Application Security obvservations from March 2018.

Added: October 20, 2018
image from Swearing Trojan Overview

Swearing Trojan Overview

This is an overview of the Swearing Trojan infecting mobile banking.

Added: October 20, 2018
image from Threat Visibility And Cybersecurity Management

Threat Visibility And Cybersecurity Management

This paper seeks to discuss the weaknesses of cybersecurity management.

Added: October 20, 2018
image from 2016 State of Security Operations

2016 State of Security Operations

In the State of Security Operations Maturity report, Hewlett Packard Enterprise provides updates to the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on a worldwide organizations.

(more available)
Added: October 19, 2018
  • ««
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)