8 datasets found
  1. Most common insider threats in the U.S. 2020

    • statista.com
    Updated Dec 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Most common insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155585/most-common-insider-threat-types-united-states/
    Explore at:
    Dataset updated
    Dec 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020
    Area covered
    United States
    Description

    A 2020 study found that data exfiltration was the most common type of insider threat, followed by privilege misuse. Data exfiltration accounted for 62 percent of insider threats caused by employees and contractors. The loss of sensitive data can cost a business millions of dollars and severely damage its reputations.

  2. c

    Insider Threat Test Dataset

    • kilthub.cmu.edu
    txt
    Updated May 30, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Brian Lindauer (2023). Insider Threat Test Dataset [Dataset]. http://doi.org/10.1184/R1/12841247.v1
    Explore at:
    txtAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    Carnegie Mellon University
    Authors
    Brian Lindauer
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The Insider Threat Test Dataset is a collection of synthetic insider threat test datasets that provide both background and malicious actor synthetic data.The CERT Division, in partnership with ExactData, LLC, and under sponsorship from DARPA I2O, generated a collection of synthetic insider threat test datasets. These datasets provide both synthetic background data and data from synthetic malicious actors.For more background on this data, please see the paper, Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data.Datasets are organized according to the data generator release that created them. Most releases include multiple datasets (e.g., r3.1 and r3.2). Generally, later releases include a superset of the data generation functionality of earlier releases. Each dataset file contains a readme file that provides detailed notes about the features of that release.The answer key file answers.tar.bz2 contains the details of the malicious activity included in each dataset, including descriptions of the scenarios enacted and the identifiers of the synthetic users involved.

  3. Most common data exfiltration behaviors during insider threats in the U.S....

    • statista.com
    Updated Dec 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Most common data exfiltration behaviors during insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155846/most-common-data-exfiltration-insider-threat-types-usa/
    Explore at:
    Dataset updated
    Dec 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020
    Area covered
    United States
    Description

    A 2020 study revealed that e-mail forwarding to a personal e-mail account was the most common method of sensitive data exfiltration during insider incidents. Misuse of cloud collaboration privileges was ranked second with a 16.07 percent occurrence rate.

  4. F

    Cross Domain Solutions (CDS) Market By Component (Services, Hardware, and...

    • fnfresearch.com
    pdf
    Updated Jun 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Facts and Factors (2025). Cross Domain Solutions (CDS) Market By Component (Services, Hardware, and Software), By Usage (Cyber-security, Disaster-response, Defence, Supply Chain Security, Intelligence Services, Data Protection, Network Security, and Others), By Deployment Mode (On-Premise and Cloud Based), By Offering (Remote Browser Isolation, Security Gateway, Private Access, Secure Web Gateway, Email Security, Data Loss Prevention, Next Generation Firewall, Insider Threat, Data Diodes, Cross Domain Security, and Others), By Technologies (Multi-Domain Operations and Others), and By End User (Commercial and Military): Global Industry Perspective, Comprehensive Analysis and Forecast, 2020 – 2026 [Dataset]. https://www.fnfresearch.com/cross-domain-solutions-cds-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jun 14, 2025
    Dataset authored and provided by
    Facts and Factors
    License

    https://www.fnfresearch.com/privacy-policyhttps://www.fnfresearch.com/privacy-policy

    Time period covered
    2022 - 2030
    Area covered
    Global
    Description

    [195+ Pages Report] Global Cross Domain Solutions (CDS) market expected USD 1.69 Billion in 2019 and is expected to reach USD 4.11 Billion by 2026 with growth at a CAGR of 10.3%. The Cross Domain Solutions enables data streaming among erratic security spaces and different groups spread over heterogeneous organizations.

  5. Main actors involved in recent (CS)² compromises 2020-2023

    • statista.com
    Updated May 30, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Main actors involved in recent (CS)² compromises 2020-2023 [Dataset]. https://www.statista.com/statistics/1469579/top-threat-actors-in-cs-2-attacks-globally/
    Explore at:
    Dataset updated
    May 30, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020 - 2023
    Area covered
    Worldwide
    Description

    In a survey conducted throughout 2020-2023, the main threat to control system cybersecurity (CS)² were well-meaning but negligent insiders. A noteworthy trend is a significant increase of malicious insiders, from only 11 percent in 2020 to around 32 percent by 2023. Cybercriminal activity had a similar rise of approximately 15 percent between 2020 and 2023.

  6. c

    Global Industrial Cybersecurity Market Report 2025 Edition, Market Size,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated Jul 15, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2023). Global Industrial Cybersecurity Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/industrial-cybersecurity-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    Jul 15, 2023
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the global industrial cybersecurity market size reached USD 23.5 billion in 2024 and will expand at a CAGR of 8.2% from 2024 to 2031. Market Dynamics of Industrial Cybersecurity Market

    Key Drivers for Industrial Cybersecurity Market

    Emergence of Disruptive Digital Technologies - Government agencies and other organizations are launching measures to accelerate the use of emerging technologies in manufacturing industries. For example, in 2022, the UAE's Ministry of Industry and Advanced Technology (MoIAT) and EDGE Group PJSC (UAE) signed a memorandum of understanding (MoU) to set up the first Industry 4.0 Enablement Centre to promote the robust implementation of Industry 4.0 technologies throughout the manufacturing sector in the country. Digital transformation boosts productivity, improves efficiency, and lowers manufacturing costs. However, it also gives hackers more opportunities to exploit vulnerable networks and systems. As per Trend Micro Incorporated (Japan), 61% of industrial manufacturers reported cybersecurity problems in their smart factories in 2020. These attacks affected manufacturing processes, causing output delays and permanent loss of capital and essential and confidential data. As a result, the heightened risk of cyberattacks associated with the emergence of disruptive digital technologies has increased the demand for access control, real-time security monitoring, and surveillance in manufacturing facilities, propelling the market adoption of cybersecurity solutions in the industrial sector.
    Moreover, the constant increase in the utilization of cloud-based solutions by SMEs and industrial cybersecurity-as-a-service are leading trends in this global market expansion.
    

    Key Restraints for Industrial Cybersecurity Market

    The higher implementation costs, the complexity of integration across diverse industrial environments, and a shortage of specialized cybersecurity expertise are the primary barriers to the industrial cybersecurity market's growth.
    The industry also faces substantial challenges as some firms are hesitant to adopt new technologies due to concerns about operational disruptions during deployment or potential compatibility issues with existing systems.
    

    Introduction of the Industrial Cybersecurity Market

    Industrial enterprises face more cybersecurity challenges than ever before. Ransomware and political instability heighten the risk of safety problems and operational disruptions. The industrial cybersecurity market includes technologies, solutions, and services for protecting industrial control systems (ICS), supervisory control & data acquisition (SCADA) systems, and other operational technology (OT) infrastructure against cyber-attacks and vulnerabilities. Malware, phishing attacks, ransomware, insider threats, and other malicious actions are examples of cyber threats that try to disrupt or compromise industrial processes, vital infrastructure, and manufacturing operations. The introduction of AI and IoT-powered industrial robots has raised the market demand for robust industrial cybersecurity services for defense against increased cyber-attacks and data breaches. The combination of AI and industrial robots enabled the automation of complex and repetitive activities, which is expanding industrial productivity and efficiency.

  7. Marché des solutions inter-domaines (CDS) par composant (services, matériel...

    • fnfresearch.com
    pdf
    Updated Jun 18, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Facts and Factors (2025). Marché des solutions inter-domaines (CDS) par composant (services, matériel et logiciel), par utilisation (cybersécurité, réponse aux catastrophes, défense, sécurité de la chaîne d'approvisionnement, services de renseignement, protection des données, sécurité du réseau et autres), par mode de déploiement (sur site et dans le cloud), par offre (isolation du navigateur à distance, passerelle de sécurité, accès privé, passerelle Web sécurisée, sécurité de la messagerie électronique, prévention de la perte de données, pare-feu de nouvelle génération, menace interne, diodes de données, sécurité inter-domaines et autres), par technologies (opérations multi-domaines et autres) et par utilisateur final (commercial et militaire) : perspective mondiale de l'industrie, analyse complète et prévisions, 2020-2026 [Dataset]. https://www.fnfresearch.com/fr/cross-domain-solutions-cds-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jun 18, 2025
    Dataset authored and provided by
    Facts and Factors
    License

    https://www.fnfresearch.com/privacy-policyhttps://www.fnfresearch.com/privacy-policy

    Time period covered
    2022 - 2030
    Area covered
    Global
    Description

    [Rapport de plus de 195 pages] Le marché mondial des solutions inter-domaines (CDS) devrait atteindre 1.69 milliard USD en 2019 et 4.11 milliards USD d'ici 2026 avec une croissance de 10.3 %. Les solutions inter-domaines permettent la diffusion de données entre des espaces de sécurité erratiques et différents groupes répartis dans des organisations hétérogènes.

  8. Background Check Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Mar 4, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Background Check Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/background-check-market
    Explore at:
    pdf, pptx, csvAvailable download formats
    Dataset updated
    Mar 4, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Background Check Market Outlook 2032



    The global background check market size was USD 13.83 Billion in 2023 and is likely to reach USD 38.70 Billion by 2032, expanding at a CAGR of 12% during 2024–2032. The market is propelled by the increasing demand for reliable and accurate information in the commercial and private sectors.



    Growing demand for advanced screening solutions is one of the key trends in the market. Businesses are becoming more global, which is making remote work common. Companies are seeking sophisticated and comprehensive screening solutions. These advanced checks verify the identity and credentials, and assess their suitability for the role based on online behavior and digital footprint.





    • According to a news article published in Forbes on February 1, 2022, a survey was conducted by Ladders, a job site, meticulously monitoring the prevalence of remote work options among 50,000 of North America's largest employers, since the start of the COVID-19 pandemic. It revealed that the remote trend is likely to continue growing in the coming future.




    • The survey found that less than 4% of high-paying jobs initially offered remote opportunities, but this figure rose to approximately 9% by the end of 2020 and incrementally proceeded to surpass 15% currently.







    Increasing focus on continuous background checks is a recent trend in the market. Traditionally, background checks were conducted only during the hiring process. However, companies are now recognizing the need for ongoing checks to manage risks associated with insider threats, workplace violence, and employee fraud.



    Rising regulatory compliance requirements are significantly impacting the market. With increasing scrutiny from regulatory bodies, companies are mandated to conduct thorough background checks to ensure compliance with laws related to employment, security, and data privacy.



    <span style=&quo

  9. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2024). Most common insider threats in the U.S. 2020 [Dataset]. https://www.statista.com/statistics/1155585/most-common-insider-threat-types-united-states/
Organization logo

Most common insider threats in the U.S. 2020

Explore at:
Dataset updated
Dec 10, 2024
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
2020
Area covered
United States
Description

A 2020 study found that data exfiltration was the most common type of insider threat, followed by privilege misuse. Data exfiltration accounted for 62 percent of insider threats caused by employees and contractors. The loss of sensitive data can cost a business millions of dollars and severely damage its reputations.

Search
Clear search
Close search
Google apps
Main menu