Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

3rd Party Services

Below you will find reports with the tag of “3rd Party Services”

image from Top 15 Chief Information Security Officers 2018

Top 15 Chief Information Security Officers 2018

SecurityScorecard ran an analysis, looking at the security ratings of organizations over a six month period and identified which organizations improved those scores the most; whether overall or within a specific risk area.

(more available)
Added: November 4, 2018
image from 2017 Financial Cybersecurity Report

2017 Financial Cybersecurity Report

“To take a look at the cybersecurity health of financial institutions, this September, SecurityScorecard analyzed 2,924 financial institutions in the SecurityScorecard platform to find existing vulnerabilities within banks, investment firms, and other financial firms to determine the cybersecurity performance of the financial sector, especially as compared to other industries. Our team also analyzed the cybersecurity posture of the Top 20 highest performing FDIC-insured banks to understand what security factors pose risks to these financial institutions.”

(more available)
Added: November 4, 2018
image from Impact of cybercrime on Canadian businesses, 2017

Impact of cybercrime on Canadian businesses, 2017

The Canadian Survey of Cyber Security and Cybercrime was conducted for the first time to measure the impact of cybercrime on Canadian businesses. This release coincides with Cyber Security Awareness Month, which is an internationally recognized campaign held each October to inform the public of the importance of cyber security.The Canadian Survey of Cyber Security and Cybercrime was conducted for the first time to measure the impact of cybercrime on Canadian businesses. This release coincides with Cyber Security Awareness Month, which is an internationally recognized campaign held each October to inform the public of the importance of cyber security.

(more available)
Added: November 4, 2018
image from 2016 Hacked Website Report Q1

2016 Hacked Website Report Q1

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 26, 2018
image from 2016 Security Pressures Report

2016 Security Pressures Report

A survey of 1,600 IT professionals on the risks being faced by organizations, the common reactions to those concerns, and the challenges with which individuals are struggling.

(more available)
Added: October 26, 2018
image from 2018 Eye On Privacy Report

2018 Eye On Privacy Report

This paper tries to answer the question, “What does the general public know about data privacy?”

Added: October 26, 2018
image from 2018 Threat Hunting Report

2018 Threat Hunting Report

This group takes a look at Threat Hunting and examines how organizations are moving to a pro-active approach to cybersecurity.

(more available)
Added: October 26, 2018
image from 7 Myths About Network Management In A Digital World

7 Myths About Network Management In A Digital World

This e-book seeks to help you understand all of the many details necessary for succesful network management.

Added: October 26, 2018
image from A SaaS Provider Survival Guide

A SaaS Provider Survival Guide

This report covers performance, security, and encryption essentials for online applications.

Added: October 26, 2018
image from Cloud Infrastructure In The Federal Government

Cloud Infrastructure In The Federal Government

Many federal agencies have begun adoption of modern, agile approaches to software delivery, with the goal of building higher quality services faster and more cheaply. While there are significant barriers to the adoption of this paradigm in the federal government, this paper offers specific principles and practices that have already achieved success.

(more available)
Added: October 26, 2018
image from Cloud Security Trends: February 2018

Cloud Security Trends: February 2018

This is a report on cloud security trends.

Added: October 26, 2018
image from Definitive Guide To Secure Remote Access

Definitive Guide To Secure Remote Access

The purpose of this document is to provide answers to what to look for when choosing a security tool for remote access to internal applications.

(more available)
Added: October 26, 2018
image from Deployment Architectures For The Top 20 CASB Use Cases

Deployment Architectures For The Top 20 CASB Use Cases

This document reviews the primary CASB deployment modes and then describes the 20 most common CASB use cases, revealing which deployment mode best supports each of the use cases.

(more available)
Added: October 26, 2018
image from Functional Model Representation of the Identity Ecosystem

Functional Model Representation of the Identity Ecosystem

The Identity Ecosystem Functional Model deliverable was developed by the IDESG Security Committee to provide context to discussions of identity ecosystems and a consistent model upon which to center descriptions of identity solutions. This is not a model of the IDESG as an organization but a representation of online identity interactions and the various components needed to execute those interactions.

(more available)
Added: October 26, 2018
image from SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

SANS 2018 Security Operations Center Survey: The Definition of SOC-cess?

This report is based on a survey, that is intended to provide a community perspective on what security operations centers (SOCs) look like within organizations across the globe, as well as data and guidance to enable organizations to build, manage, maintain and mature effective and efficient SOCs.

(more available)
Added: October 26, 2018
image from Threats Report - December 2016

Threats Report - December 2016

An interview-based report, drawing from interviews of 400 security professionals. Covers topics such as the current state of SOC design, ransomware, and the rise of malware in otherwise legitimate software.

(more available)
Added: October 26, 2018
image from 2016 Hacked Website Report Q3

2016 Hacked Website Report Q3

This is an annual report that discusses the latest malware and hacking trends in compromised websites.

Added: October 25, 2018
image from BTCWare Ransomware

BTCWare Ransomware

This paper takes a look at a smaller Ransomware family that has not received as much press as the other bigger ransomware families.

(more available)
Added: October 25, 2018
image from Cross Domain Security Rising To The Clouds

Cross Domain Security Rising To The Clouds

This report asks the question, “The US Government is beginning the migration to cloud services with FedRAMP providers and other dedicated resources – what’s the best approach for your agency?”

(more available)
Added: October 25, 2018
image from DDoS Trends Report Q2-Q3 2017

DDoS Trends Report Q2-Q3 2017

This report contains observations from DDoS attack attempts in Q2 2017 and Q3 2017, as well as comparisons against previous quarters. The data represents the frequency and sophistication of DDoS attacks that organizations face today.

(more available)
Added: October 25, 2018
image from Encryption -- What's Hiding In Plain Sight

Encryption -- What's Hiding In Plain Sight

The Internet has adapted to encryption at a breakneck speed. Multiple studies indicate a rapid increase of encrypted Internet traffic. Sandvine came out with a paper during February 2016 stating that 70% of the Internet traffic would be encrypted by that year’s end. By mid-2017, we can only predict that the percentage is much higher than 70%.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 4, 2025 08:08 UTC (build b1d7be4)