Various public documents, whitepapers, articles, data, and analysis about breaches
For the moment, it would be nice to have a PDF of the article that we add to the list, just to be sure we always have a copy.
To contribute, you can either:
- Fork, add the report, and send in a pull request; or
- Open an issue with the data you want to be added.
Adding data:
- Add a link to the public document to README.md page.
- Add the PDF file to the appropriate year. If the document is only available in HTML, print a "clean" version (e.g. with Readability, Clearly, or similar) to PDF and add that.
If you have any questions, please reach out to @andrewsmhay.
- BREACH REPORT 2015: Protected Health Information (PHI) - Redspin
- State of Application Security – Vol. 5, 2016 - Consolidated Edition - Arxan
- State of Application Security – Vol. 5, 2016 - Healthcare Edition - Arxan
- State of Application Security – Vol. 5, 2016 - Financial Services Edition - Arxan
- Study Finds More British Internet Users Concerned About Data Privacy Than Losing Their Income - TRUSTe/NCSA
- Study Finds More Americans Concerned About Data Privacy Than Losing Their Income - TRUSTe/NCSA
- The Cloud Balancing Act for IT: Between Promise and Peril - Cloud Security Alliance (CSA), Skyfence
- 2015 WordPress Security Survey - Wordfence
- 2016 Data Breach Industry Forecast - Experian Data Breach Resolution
- Hacking Healthcare IT in 2016 - Institute for Critical Infrastructure Technology (ICIT)
- The Global Risks Report 2016 - World Economic Forum
- Cisco 2016 Annual Security Report - Cisco Systems
- Turnaround and Transformation in Cybersecurity: Key findings from The Global State of Information Security Survey 2016 - PWC
- State of Application Security – Vol. 4, 2015 - Arxan
- Behind Our Digital Doors: Cybersecurity & the Connected Home - Raytheon, NCSA
- Securing Our Future: Closing the Cybersecurity Talent Gap - Raytheon, NCSA
- EY’s Global InformationvSecurity Survey 2015 - EY
- Global Insurance & Regulatory Bulletin - Mayer Brown
- 2015 Global Cyber Impact Report - Aon Risk Services, Ponemon Institute
- Data Breach Quick View: Mid-Year 2015 Data Breach Trends - Risk Based Security
- 2015 Dell Security Annual Threat Report - Dell Security
- Data Breach Industry Forcast - Experian
- 2015 Trustwave Global Security Report - Trustwave
- Internet Security Threat Report 20 - Symantec
- A Clearer View of Emerging Risks - Guy Carpenter
- 2015 Centri Data Breach Report: An Analysis of Enterprise Data Breaches & How to Mitigate Their Impact - Centri
- 2015 Vormetric Insider Threat Report - Vormetric
- Cyber Security Awareness Report - Cyren
- Data Breach Reports - IDT911, Identity Theft Resource Center
- 2015 First Half Review: Findings from the Breach Level Index - Gemalto
- 2015 Breach Preparedness & Response Study - FireEye, iSMG
- Health Care and Cyber Security - KPMG
- Microsoft Security Intelligence Report, Volume 19 - Microsoft
- 2015 Cyber Claims Study - NetDiligence, AllClearID
- Pandalabs Report Q1 2015 - Panda Security
- Proofpoint Threat Report - Proofpoint
- 2015 Cost of Data Breach Study: Global Analysis - Ponemon Institute, IBM
- 2015 Cost of Data Breach Study: United States - Ponemon Institute, IBM
- UK 2015 Cyber Risk Survey Report - Marsh & McLennan Companies
- A 2015 Survey: Cybersecurity in the Boardroom - NYSE, Veracode
- Hype and Heavy Tails: A Closer Look at Data Breaches - University of New Mexico, Lawrence Berkeley National Laboratory
- Payment Security Report 2015 - Worldpay
- Cyber Risk: Threat and opportunity - Insurance Information Institute (iii)
- Data Breaches in the Government Sector - Rapid7
- Risk & Regulatory Outlook - Deloitte
- Information Security and Cyber Liability Risk Management - Advisen
- Damage Control: The Cost of Security Breaches - Kaspersky Lab
- 2015 Protected Health Information Data Breach Report - Verizon
- 2015 Data Breach Investigations Report - Verizon
- M-Trends 2015: A View From The Front Lines - Mandiant, a FireEye Company
Special thanks to the folks at APTNotes for the idea.