The Ultimate List of Recent Security Reports (well not really ultimate but it sounds catchy)

1. Check Point Software's Security Report and Exploits at the Endpoint: SANS 2016 Threat Landscape Study
2. IoT device use in DDoS attacks 
3. Federal Information Security - Actions Needed To Address Challenges
4. McAfee Labs Threat Report - September
5. Assessing Threats To Mobile Devices and Infrastructure - NIST
6. Recommended Practice: Improving Industrial Control System CyberSecurity with DiD Stategies
7. Cybersecurity Framework Manufacturing Profile - NIST
8. Report: Measuring The Financial Impact of IT Cybersecurity on Business
9. Akami - Q2 2016 State of The Internet/Security Report
10. How to Dramatically Improve Corporate IT Security without Spending Millions
11. CerberRing: Ransomware’s Underworld
12. IT Threat Evolution in Q2 2016 
13. Spam & Phishing in Q2 2016
14. The cost of incidents affecting CIIs 
15. Malicious Email Mitigation Strategies
16. Kaspersky DDoS Intelligence Report for Q2 2016
17. SAP Cyber Threat Report 2016
18. Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
19. Cisco 2016 Midyear Cybersecurity Report
20. Growing Up Online : Connected Kids
21. Hacking The Skills Shortage 
22. Evaluating the Customer Journey of Crypto-Ransomware
23. RSA Cybersecurity Poverty Index 2016
24. Industrial cybersecurity threat landscape
25. Ransomware - What it is and what to do about it 
26. Cyber Threats To The Mining Industry
27. McAfee LabsThreats ReportDecember 2016
28. 2016 Enterprise Phishing Susceptibility and Resiliency Report
29. Kaspersky Security Bulletin 2016 - Review of the year 
30. ENISA's Opinion Paper on Encryption 
31. Trend Micro - 8 Security Predictions for Next Year 
32. Kaspersky - Story of the year The Ransomware Revolution
33. Recorded Future - New Kit, Same Player Top 10 Vulnerabilities Used By Exploit Kits in 2016. 
34. Analysis of APT28 Threat Group Is Discussed by FireEye
35. ENISA Gives Insight into Securing Mobile Payments Best Practices 
36. ENISA Offers a Matrix for Assessing Online Privacy Tools
37. A good practice guide of using taxonomies in incident prevention and detection