Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Cloudlock

Below you will find reports with the source of “Cloudlock”

image from The Explosion Of Apps: 27% Are Risky

The Explosion Of Apps: 27% Are Risky

This report seeks to outline the potential problems related to apps that are allowed to have access to corporate networks and servers.

(more available)
Added: October 14, 2018
image from The Cloud Threat Funnel: Suspicious User Behavior That Matters

The Cloud Threat Funnel: Suspicious User Behavior That Matters

For this cybersecurity report, the Cloudlock CyberLab analyzed daily behavior across 10 million users, 1 billion files, and 101,000 apps to surface insightful trends and help organizations detect signs of threat. On the following pages, we’ll walk you through the CyberLab’s Cloud Threat Funnel, designed to help security teams narrow their focus onto user activities that are the most indicative of true threat.

(more available)
Added: October 13, 2018
image from Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

Employees Hunt For Pokemon Go Exposing Sensitive Corporate Data

This Case Study looks at an example of how the app Pokemon Go, caused the compromise of sensitive corporate data.

(more available)
Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 14, 2025 16:08 UTC (build b1d7be4)