Note: These are publicly available reports which links to their respective authors. You may need to sign up to access them.*
Carbon Black 2017 Global Threat Report
Carbon Black 2019 Global Incident Response Threat Report
Carbon Black 2019 Global Threat Report
Cisco 2014 Annual Cybersecurity Report
Cisco 2015 Annual Cybersecurity Report
Cisco 2016 Annual Cybersecurity Report
Cisco 2017 Annual Cybersecurity Report
Cisco 2018 Annual Cybersecurity Report
Crowdstrike 2018 Global Threat Report
Crowdstrike 2019 Global Threat Report
Duo 2016 Trusted Access Report
Duo 2017 Trusted Access Report
Duo 2018 Trusted Access Report
Duo 2019 Trusted Access Report
ENISA 2018 Threat Landscape Report
ENISA 2016 Threat Landscape Report
ENISA 2017 Threat Landscape Report
FireEye Advanced Threat Report: 2H 2011
FireEye: APT41 Double Dragon: A dual espionage andcyber crime operation
FireEye: THE ROAD AHEAD: CYBER SECURITY IN 2020 AND BEYOND
Mandiant: APT Exposing One of China’s Cyber Espionage Units
FISMA 2015 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency
FISMA 2016 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency
FISMA 2017 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency
FISMA 2018 Annual Report to Congress on OMB and the Cybersecurity and Infrastructure Security Agency
Google Transparency: Android ecosystem security
Google Transparency: HTTPS encryption on the web
Google Transparency: Email encryption in transit
Google Transparency: Safe Browsing: malware and phishing
ITU Global Cybersecurity Index (GCI) 2018
ITU Global Cybersecurity Index (GCI) 2017
Microsoft Security Volume 10: July - December 2010
Microsoft Security Volume 11: January - June 2011
Microsoft Security Volume 12: July - December 2011
Microsoft Security Volume 13: January - June 2012
Microsoft Security Volume 14: July - December 2012
Microsoft Security Volume 15: January - June 2013
Microsoft Security Volume 16: July – December 2013
Microsoft Security Volume 17: January - June 2014
Microsoft Security Volume 18: July - December 2014
Microsoft Security Volume 19: January - June 2015
Microsoft Security Volume 20: July - December 2015
Microsoft Security Volume 21: January - June 2016
Microsoft Security Volume 22: January - March 2017
Microsoft Security Volume 23: February – December 2017
Microsoft Security Volume 24: January - December 2018
NIST/ITL 2016 Cybersecurity Program Annual Report
NIST/ITL 2017 Cybersecurity Program Annual Report
NTT 2016 Global Threat Intelligence Report
NTT 2017 Global Threat Intelligence Report
NTT 2018 Global Threat Intelligence Report
NTT 2019 Global Threat Ingelligence Report
SANS 2016 Security Awareness Report
SANS 2017 Security Awareness Report
SANS 2018 Security Awareness Report
SANS 2019 Security Awareness Report
SANS 2019 Security Awareness Report Package
Proofpoint 2015 Human Threat Report
Proofpoint 2016 Human Threat Report
Proofpoint 2017 Email Fraud Report
Proofpoint 2017 Human Factor Report
Proofpoint 2018 Human Factor Report
Proofpoint 2019 Domain Fraud Report
Proofpoint 2019 Human Factor Report
Proofpoint Q1 2017 Threat Report
Proofpoint Q1 2018 Threat Report
Proofpoint Q1 2019 Threat Report
Proofpoint Q2 2017 Threat Report
Proofpoint Q2 2018 Threat Report
Proofpoint Q3 2017 Threat Report
Proofpoint Q3 2018 Threat Report
Proofpoint Q4 2017 Threat Report
Proofpoint Q4 2018 Threat Report
Wombat/Proofpoint 2016 State of the Phish
Wombat/Proofpoint 2017 State of the Phish
Wombat/Proofpoint 2018 State of the Phish
Wombat/Proofpoint 2019 State of the Phish