2017 Q2

2016 Internet Crime Report (Internet Crime Complaint Center)

2017 Q1

Cybercrime and Other Threats Faced by the Healthcare Industry (Trend Micro)

State of Cyber Security 2017 Part 1: Current Trends in Workforce Development (ISACA)

The State of Cybersecurity in the Oil & Gas Industry: United States (Ponemon Institute / Siemens)

2017 Credential Spill Report (Shape Security)

US Cities Exposed: Industries and ICS A Shodan-Based Security Study of Exposed Systems and Infrastructure in the US (Trend Micro)

Data Breach Digest (Verizon)

Building Trust in a Cloudy Sky: The state of cloud adoption and security (Intel Security)

The Effect of Encryption on Lawful Access to Communications and Data (CSIS)

Path to cyber resilience: Sense, resist, react – 19th Global Information Security Survey 2016-17 (EY)


Americans and Cybersecurity (Pew Research)

The Rise of Ransomware (Carbonite / Ponemon Institute)

State of Security Operations 2016 (HPE)

Threat Landscape Report 2016 (ENISA)

Q4 2016 & Year In Review Threat Summary (Proofpoint)

Examining the ‘Copy and Paste’ Function in the Use of Electronic Health Records (NIST)

2017 State of Malware Report (Malwarebytes)

The Global Risks Report 2017 – 12th Edition (World Economic Forum)

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution (Director of National Intelligence)

TOP 10 LEGAL RISKS FOR BUSINESS IN 2017 (Borden Ladner Gervais LLP)

A report from the Children’s Commissioner’s Growing Up Digital Taskforce (UK Office of the Children’s Commissioner)

2016 Q4

Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats (Center for Cyber and Homeland Security)

Securing Smart Airports (European Union Agency for Network and Information Security)

National Cyber Security Strategy 2016 to 2021 (UK Government)

Encryption Working Group Year-End Report (US House Judiciary Committee’s Encryption Working Group)

2016 McAfee Labs Threats Report (Intel Security)

ESG and ISSA Research Reveals Cyber Security Profession at Risk Part II (ISSA)

2016 Enterprise Phishing Susceptibility and Resiliency Report (PhishMe)


Crossing the line: Staying on the right side of consumer privacy (KPMG)

Health Care Cyber Breach Research Report for 2016 (TrapX Security)

Beyond the Phish 2016 (Wombat)

The Private Sector and Active Defense Against Cyber Threats (George Washington University)

Building Confidence: Facing the Cybersecurity Conundrum (Accenture)

Hacker’s Playbook Report 2nd Edition (SafeBreach)

2016 Survey on Security and Risk in the Financial Sector (SANS)

The Cyber Security Readiness of Canadian Organizations 2016 (Scalar)

GRIZZLY STEPPE – Russian Malicious Cyber Activity (DHS)

Postmarket Management of Cybersecurity in Medical Devices (FDA)

Questions and Answers: the 2017 Security Landscape (FireEye)

Small Business Information Security: The Fundamentals (NIST)

2016 Norton Cyber Security Insights Report (Symantec)

The Global Risks Report 2016 11th Edition (World Economic Forum)

2016 ICIT Ransomware Report (Institute for Critical Infrastructure Technology)

Security Keys: Practical Cryptographic Second Factors for the Modern Web (Google)

Health Warning: Cyberattacks are targeting the health care industry (Intel Security)

2017 Emerging Cyber Threats, Trends & Techologies Report (Georgia Tech)

SILVERTERRIER: The Next Evolution in Nigerian Cybercrime (Palo Alto Networks)

2016 Q3

Ransomware: How Consumers and Businesses Value Their Data (IBM)

Review of the Unauthorized Disclosures of the National Security Agency Contractor Edward Snowden

Security Fatigue (IEEE Computer Socieity)

Global Economic Crime Survey 2016 (PwC)

What’s Driving Boards of Directors to Make Cyber Security a Top Priority? (Bay Dynamics)

Q3 State of the Internet / Security Report (Akamai)

An in-depth expose on Ceber ransomware-as-a-service (Check Point)

The State of Cybersecurity and Digital Trust 2016 (Accenture)

Cybercrime Report Q3 2016 (ThreatMetrix)

UK Cyber Risk Survey Report: 2016 (Marsh)

2016 Internet Organised Crime Threat Assessment (Europol)

Taking the Offensive – Working together to disrupt digital crime (BT / KPMG)

2016 Threat Landscape Report (Fortinet)

Examining the costs and causes of cyber incidents (Journal of Cybersecurity)

2016 Cost of Data Breach Study: Global Analysis (Ponemon)

2016 Cost of Data Breach Study: Canada (Ponemon)

2016 Cost of Data Breach Study Impact of Business Continuity Management (Ponemon)

X-Force® Research 2016 Cyber Security Intelligence Index (IBM)

Threat Intelligence Follow the Money: Dissecting the Operations of FIN6 (FireEye)

2016 Midyear Cybersecurity Report (Cisco)

2016 Global Advanced Threat Landscape Survey (CyberArk)

2016 Midyear Security Roundup: The Reign of Ransomware (Trend Micro)

HPE Security Research Cyber Risk Report 2016 (HPE)

Please note: None of these links are affiliate and I have no financial interest in or relation to any of the vendor’s published reports that I have included.